Devry Comp 129 Full Course

Published on May 2017 | Categories: Creative Writing | Downloads: 128 | Comments: 0 | Views: 495
Download PDF   Embed   Report

Devry Comp 129 Full Course http://www.homeworkarena.com/devry-comp-129-full-course Devry Comp 129 Week 1 Discussion Discussion 1 In this discussion, we will look at the basics of both hardware and operating systems. To begin this discussion, let’s first define the difference between hardware and software. What is hardware? What is software? What are the purposes of hardware and software? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 In this discussion, we will look at power supplies and form factors. What is the purpose of a power supply? What is a form factor? How do power supplies and form factors relate to one another? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry Comp 129 Week 2 Discussion Discussion 1 Take some time this week to open up your computer (or better yet, an old junky one), and take a look inside (be sure to unplug your machine and not to touch any of the components—look but don’t touch). Based on your readings, what kind of motherboard is being used? What form factor? How did you know? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 What is a CPU? What is the purpose of the CPU? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry Comp129 Week 3 Discussion Discussion 1 Describe the Windows operating system. Discuss some of your favorite Windows features. Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts Discussion 2 Have you ever had a problem with your Windows operating system? What happened, and what was the result? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry Comp129 Week 4 Discussion Discussion 1 Identify and discuss some peripherals that ordinary desktop PC users would normally use. Discuss how they work and their purposes. Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 Discuss backup strategies and devices that you can use with your PC at home or in the workplace. How does the device connect? What standards does it use? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP129 Week 5 Discussion Discussion 1 What are the basic components required to set up a network? How do you add a PC to a network? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 What is one of your favorite applications that utilizes the Internet? Discuss what happens behind the scenes in the network that enables your PC to implement that application. Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP 129 Week 6 Discussion Discussion 1 What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP 129 Week 7 Discussion Discussion 1 What is troubleshooting? How can you find the cause(s) of the problem quickly when you have limited experience? Why is it important to keep a computer healthy? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. discussion 2 We have studied the CLI for both Windows and Linux. The real power in using commands comes with scripting. What are some repetitive tasks you can think of that could be done more easily with a well-written script? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP 129 All Weeks quizzes week 1 1. 1. Question : (TCO 2) Why is having the correct device driver so important? Question 2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port? Question 3. Question : (TCO 2) What is the primary purpose of the power supply? Question 4. Question : (TCO 2) What atmospheric condition can increase the potential for static electricity? Question 5. Question : (TCO 2) A _____ is required before software from the BIOS is executed. Question 6. Question : (TCO 2) Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times? Question 7. Question : (TCO 1) Refer to the provided figure. What type of cable would have this symbol? Question 8. Question : (TCO 1) Jane decides to restart her computer by pressing the Ctrl+Alt+Delete combination keys. This procedure is called a _____. Question 9. Question : (TCO 1) Why is it best not to start cleaning a computer by using compressed air? Question 10. Question : (TCO 11) After a problem is solved, a technician must _____ findings, actions, and outcomes. Devry Comp129 Week 2 Quiz 1. 1. Question : (TCO 3) Major microprocessor manufacturers are _____. Question 2. Question : (TCO 3) What does quad core mean in relation of processors? Question 3. Question : (TCO 3) An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor’s computer? Question 4. Question : (TCO 3) Most motherboards use _____ for RAM. Question 5. Question : (TCO 3) Double-sided memory _____. Question 6. Question : (TCO 3) Dual channeling _____. Question 7. Question : (TCO 3) Where are mini PCIe cards normally installed? Question 8. Question : (TCO 2) Which of the following will most likely contain SO-DIMM memory? Question 9. Question : (TCO 2) A physical problem with a memory chip will often cause a(n) _____ error. Question 10. Question : (TCO 11) Bill and John are overloaded. They have to install more than 50 access points. Joni hears their frustration and offers to help. This is an example of _____. Devry Comp129 Week 3 Quiz 1. 1. Question : (TCO 4) Linux has a variety of _____ that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mvcommand for moving files, the vi editor for editing a text file, and so on. Student Answer: DOS commands utilities batch files GUI tools Instructor Explanation: TestOut Linux+ Section 0.1.3 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 4) What is a home screen on a mobile device? Student Answer: Where you have to be to see what applications are currently running Where the physical volume control is normally located Where photo files are stored Where app icons are found Instructor Explanation: Schmidt, Chapter 11 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 4) Consider the following directory structure from the C: drive root directory. 2014_Term (directory) CompRepair (subdirectory) Opsys (subdirectory) Cisco8 (subdirectory) VOIP (subdirectory) If the prompt is C:2014_Term> and you wanted to move into theCisco8 subdirectory, what command do you type? Student Answer: CD Cisco8 CD.. CD Cisco8 CD C:Cisco8 Instructor Explanation: Schmidt, Chapter 11 Points Received: 0 of 4 Comments: Question 4. Question : (TCO 4) List three items commonly found in a dialog box. Student Answer: Properties, Close button, Font button OK button, Cancel button, Make new file button Help button, Close button, OK button Help button, Close button, Restart button Instructor Explanation: Schmidt, Chapter 11 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware and configuration information for your computer? Student Answer: The System applet in Control Panel Msinfo32 Msconfig.exe Event Viewer Instructor Explanation: TestOut PC Pro Section 9 Points Received: 4 of 4 Comments: Question 6. Question : (TCO 4) Who is given credit for the GNU initiative? Student Answer: Richard Stallman Bill Gates Linus Torvald All of the above Instructor Explanation: TestOut Linux+ Section 0.1.3 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 4) Which user type was available in Windows XP but is not available for Windows Vista and 7? Student Answer: Guest Administrator Standard User Power User Instructor Explanation: Schmidt, Chapter 12 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 4) What Windows 7 feature speeds up file searches? Student Answer: Shadow Copy Indexing Sharing ReadyBoost Instructor Explanation: Schmidt, Chapter 12 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 4) What is the default location for 64-bit application files in Windows 7? Student Answer: The Windows folder The Program Files folder The SysWOW64 folder The System64 folder Instructor Explanation: Schmidt, Chapter 12 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) Learning the next-generation features of the most recent . october#”>smartphones is an example of _____. Student Answer: OS maintenance staying current with technology leveraging documentation working out a solution Instructor Explanation: Schmidt, Chapter 11 Points Received: 4 of 4 Comments: * Times are displayed in (GMT-07:00) Mountain Time (US & Canada) week 4 Devry CoMP129 Week 4 Quiz Latest 2015 October 1. 1. Question : (TCO 5) A laptop normally has an _____ type of hard drive installed. Student Answer: internal SCSI external SCSI external SATA internal SATA Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 6) Why is backing up data to a different partition on the same hard drive not a good idea? Student Answer: The data perform at a slower rate. Other users who have rights to save files can retrieve the backup, install to a different computer or drive, and potentially see others’ data. If the drive fails, both the data and the backup are potentially unusable. The backup takes longer. Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 6) Which backup type would back up all the user’s data and set the archive bit for each file? Student Answer: Comprehensive Full Differential Incremental Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Question 4. Question : (TCO 5) Which optical medium has the greatest storage capacity? Student Answer: Compact disc Dual-layer, single-sided DVD Single-layer, single-sided Blu-ray disc Dual-layer, double-sided DVD Instructor Explanation: TestOut PC Pro A+, Section 5.6 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 5) For internal optical drives, what is the most common type of internal interface found today? Student Answer: SCSI IDE USB Firewire Instructor Explanation: Schmidt, Chapter 8 Points Received: 4 of 4 Comments: Question 6. Question : (TCO 6) What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound? Student Answer: Analog-to-digital conversion rate Power rating Frequency response Signal to noise ratio Instructor Explanation: Schmidt, Chapter 8 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 5) What Android app could be used to see saved photos? Student Answer: Settings Gallery Photos Video Instructor Explanation: Schmidt, Chapter 8 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 5) What happens when you press the Fn key along with a function key on a laptop computer? Student Answer: You allow the computer to be placed in one of four power modes, which helps with video troubleshooting. You allow the computer to be placed in diagnostic mode, which is especially useful when troubleshooting video problems. You get additional features depending on the key you press. You refresh the monitor. Instructor Explanation: Schmidt, Chapter 9 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work area across two monitors. What would be the best solution for this user? Student Answer: Use an integrated VGA port and a DVI port on an adapter. Install a video card with two ports if two ports are not available on the motherboard. Use a KVM switch. Use a video splitter. Instructor Explanation: Schmidt, Chapter 9 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) What should you do when speaking on the phone with a customer who is very upset and yelling at you? Student Answer: Stay calm but raise your voice level a little to show the importance and professionalism of your technical question. Ask the caller whether you can put him or her on hold while he or she calms down. Hang up on the caller. Speak to the customer using a calm, professional tone. Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Devry Comp129 Week 6 Quiz 1. 1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____. Student Answer: Kerberos Crypto IP Encapsulation (CIPE) Internet Protocol Security (IPsec) Secure Sockets Layer (SSL) Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker. Student Answer: ExpressCard CardBus card PCI card PC Card Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 8) A worm _____. Student Answer: is a program that can replicate by attaching itself to another program can spread copies of itself throughout a network without a host program does not need a host program to work; It pretends to be a legitimate program is dormant code added to software and triggered by a predetermined event Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are. Student Answer: Authentication Authorization A background process BIOS settings Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____. Student Answer: Russian or Chinese hackers college students studying hacking employees leaving passwords in full view disgruntled employees Instructor Explanation: Week 6 Online Lecture Points Received: 0 of 4 Comments: Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used? Student Answer: Buy 1/0 rewrite software. Drill holes in the platters and smash the pieces with a hammer. Hold a magnet over each platter. Repartition the hard drive into multiple partitions using different file systems. Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols. Student Answer: user service encryption authentication authorization Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is? Student Answer: more pwd dir ls Instructor Explanation: TestOut Linux+, Section 1.1 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 9) What is SSID broadcasting? Student Answer: The method the access point uses to reach all wireless NICs with a single message A means for the access point to send the wireless encryption keys to all wireless NICs for network access The access point constantly sending the name of the wireless network into the air The access method used for 802.11 a, b, g, and n wireless networks Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) Trust between you and your customer begins with _____. Student Answer: never lying. good communications skills a new customer discount professionalism. Instructor Explanation: Schmidt, Chapter 15 Points Received: 0 of 4 Devry Comp129 Week 6 Quiz 1. 1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____. Student Answer: Kerberos Crypto IP Encapsulation (CIPE) Internet Protocol Security (IPsec) Secure Sockets Layer (SSL) Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker. Student Answer: ExpressCard CardBus card PCI card PC Card Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 8) A worm _____. Student Answer: is a program that can replicate by attaching itself to another program can spread copies of itself throughout a network without a host program does not need a host program to work; It pretends to be a legitimate program is dormant code added to software and triggered by a predetermined event Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are. Student Answer: Authentication Authorization A background process BIOS settings Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____. Student Answer: Russian or Chinese hackers college students studying hacking employees leaving passwords in full view disgruntled employees Instructor Explanation: Week 6 Online Lecture Points Received: 0 of 4 Comments: Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used? Student Answer: Buy 1/0 rewrite software. Drill holes in the platters and smash the pieces with a hammer. Hold a magnet over each platter. Repartition the hard drive into multiple partitions using different file systems. Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols. Student Answer: user service encryption authentication authorization Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is? Student Answer: more pwd dir ls Instructor Explanation: TestOut Linux+, Section 1.1 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 9) What is SSID broadcasting? Student Answer: The method the access point uses to reach all wireless NICs with a single message A means for the access point to send the wireless encryption keys to all wireless NICs for network access The access point constantly sending the name of the wireless network into the air The access method used for 802.11 a, b, g, and n wireless networks Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) Trust between you and your customer begins with _____. Student Answer: never lying. good communications skills a new customer discount professionalism. Instructor Explanation: Schmidt, Chapter 15 Points Received: 0 of 4 Comments: week 7 (TCO 4) You have been asked to temporarily fill in for a Linux administrator who has just been fired. This administrator was known to take a lax view of security and it is suspected that passwords are still kept in the /etc/passwd file. When viewing that file, which entry below would indicate that the passwords are there? kolson:85yxir:430:0:Back Door:/root:/bin/bash badams:x:341:52:Brent Adams:/users/badams:/bin/bash dclifford:x:689:306:non secure user:/root: tmurphy:x:100:100:/users/tmurphy:/bin/bash Question 2. Question : (TCO 11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When he inserts the disc and closes the drive tray, the drive turns, but he does not hear any music. What type of problem would a technician say this is? The technician would say that it is a hardware problem. The technician would say that it is a software problem. The technician would say that it is an error of the user. The technician would not be able to draw a conclusion from the description given. Question 3. Question : (TCO 10) In which troubleshooting step do you complete a help-desk ticket by typing the solution and closing the ticket? Document findings, actions, and outcomes. Identify the problem. Verify full system functionality and, if applicable, implement preventive measures. Establish a plan of action to resolve the problem and implement the solution. Question 4. Question : (TCO 10) The audio beeps heard during the boot process are caused by the _____. RAM processor CMOS BIOS Question 5. Question : (TCO 10) Hardware errors are often obvious _____. during POST during printing when saving a file during RAM access Question 6. Question : (TCO 10) What component is most likely to be included in an audio and video editing PC design? RAID Powerful GPU Multiple processors Video capture card Question 7. Question : (TCO 10) Which of the following would most likely be a design consideration for a gaming PC rather than a computer used for virtualization? NAS High amount of RAM Multiple fast, large-capacity hard drives Additional system cooling Question 8. Question : (TCO 10) Debbie keeps getting an error each time she tries to save her worksheet in AJAX ABC accounting software to the thumb drive. She then saves an Excel spreadsheet she was working on to the thumb drive and it too produces the error. A good next step would be to _____. save the file to a different drive. open the computer case to see whether the thumb drive is connected properly. replace the hard drive. Question 9. Question : (TCO 10) Which statement is true regarding mobile design? . Netbooks are low cost and lightweight. Netbooks are typically lighter than tablets. Laptops usually have less storage capability than tablets or smartphones. Question 10. Question : (TCO 10) An internal keyboard is generally connected to the laptop’s system board using a _____. USB connector ribbon cable PS/2 port mini-molex connector Course Project: Due in Week 7 (Begin in Week 1) Objectives .equella.ecollege.com/file/fe25679a-cc25-4079-a28b-289fa1484619/19/COMP129_CH_CourseProject.html#top”>Back to Top BUILDING A PERFECT PC! The COMP129 project is designed to help you apply what you are learning each week using current hardware and software options to build a PC that meets a specific purpose. Although your Final Project is due in Week 7, you will begin working in Week 1 and continue adding components to your computer in each week of the class. Start by selecting the purpose of your computer and a budget. Then you can work each week to select components for your PC based on what you are learning in your class activities. Download the project deliverable template and create a spreadsheet in Week 1. (Remember, you will be turning in these two files in Week 7.) Build on these during the term as you work on building your perfect PC. Guidelines Plan to build your perfect PC. (Remember, you are to select each part of the computer. No kits are allowed. No prebuilt computing devices are allowed. This project is designed to help you apply what you are learning each week using current hardware and software options.) Use the lab project template to turn in your project questions. Attach an Excel spreadsheet that includes the major components, specifications, parts, vendors, pricing, and total cost as outlined below. (You can add additional rows and columns to the Excel template if you want to add more than the minimum in your completed computer build). 1. Plan the purpose of your computer. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.) 2. Preplan a price range and try to stick to it. (Were you able to stick to your budget? Why or why not?) 3. List all major components in your spreadsheet template. (Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed). 4. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.) 5. Include OS and software. 6. Update an Excel spreadsheet with all specifications and parts. 7. Price parts from two locations. You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such as.newegg.com/”>newegg.comor.tigerdirect.com/”>http://www.tigerdirect.com/. You can do all of your .comparison shopping online, if you desire. (You will be adding in the prices from these two locations as separate columns in your spreadsheet. See Item 8 below.) 8. Update your spreadsheet with the seller’s name, prices, and totals. (Make sure you add the vendor, price, and total for all the items you select, as well as the total for the computer as a whole.) 9. Write a 4–5-paragraph report on your learning and experiences in completing this project. Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay. http://www.homeworkarena.com/ Tags: Devry Comp 129 Full Course, Devry Comp 129, comp129 entire course

Comments

Content

Devry Comp 129 Full Course http://www.homeworkarena.com/devry-comp-129-full-course Devry Comp 129 Week 1 Discussion Discussion 1 In this discussion, we will look at the basics of both hardware and operating systems. To begin this discussion, let’s first define the difference between hardware and software. What is hardware? What is software? What are the purposes of hardware and software? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 In this discussion, we will look at power supplies and form factors. What is the purpose of a power supply? What is a form factor? How do power supplies and form factors relate to one another? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry Comp 129 Week 2 Discussion Discussion 1 Take some time this week to open up your computer (or better yet, an old junky one), and take a look inside (be sure to unplug your machine and not to touch any of the components—look but don’t touch). Based on your readings, what kind of motherboard is being used? What form factor? How did you know? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 What is a CPU? What is the purpose of the CPU? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry Comp129 Week 3 Discussion Discussion 1 Describe the Windows operating system. Discuss some of your favorite Windows features. Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts Discussion 2 Have you ever had a problem with your Windows operating system? What happened, and what was the result? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry Comp129 Week 4 Discussion Discussion 1 Identify and discuss some peripherals that ordinary desktop PC users would normally use. Discuss how they work and their purposes. Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 Discuss backup strategies and devices that you can use with your PC at home or in the workplace. How does the device connect? What standards does it use? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP129 Week 5 Discussion Discussion 1 What are the basic components required to set up a network? How do you add a PC to a network? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 What is one of your favorite applications that utilizes the Internet? Discuss what happens behind the scenes in the network that enables your PC to implement that application. Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP 129 Week 6 Discussion Discussion 1 What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Discussion 2 What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP 129 Week 7 Discussion Discussion 1 What is troubleshooting? How can you find the cause(s) of the problem quickly when you have limited experience? Why is it important to keep a computer healthy? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. discussion 2 We have studied the CLI for both Windows and Linux. The real power in using commands comes with scripting. What are some repetitive tasks you can think of that could be done more easily with a well-written script? Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts. Devry COMP 129 All Weeks quizzes week 1 1. 1. Question : (TCO 2) Why is having the correct device driver so important? Question 2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port? Question 3. Question : (TCO 2) What is the primary purpose of the power supply? Question 4. Question : (TCO 2) What atmospheric condition can increase the potential for static electricity? Question 5. Question : (TCO 2) A _____ is required before software from the BIOS is executed. Question 6. Question : (TCO 2) Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times? Question 7. Question : (TCO 1) Refer to the provided figure. What type of cable would have this symbol? Question 8. Question : (TCO 1) Jane decides to restart her computer by pressing the Ctrl+Alt+Delete combination keys. This procedure is called a _____. Question 9. Question : (TCO 1) Why is it best not to start cleaning a computer by using compressed air? Question 10. Question : (TCO 11) After a problem is solved, a technician must _____ findings, actions, and outcomes. Devry Comp129 Week 2 Quiz 1. 1. Question : (TCO 3) Major microprocessor manufacturers are _____. Question 2. Question : (TCO 3) What does quad core mean in relation of processors? Question 3. Question : (TCO 3) An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor’s computer? Question 4. Question : (TCO 3) Most motherboards use _____ for RAM. Question 5. Question : (TCO 3) Double-sided memory _____. Question 6. Question : (TCO 3) Dual channeling _____. Question 7. Question : (TCO 3) Where are mini PCIe cards normally installed? Question 8. Question : (TCO 2) Which of the following will most likely contain SO-DIMM memory? Question 9. Question : (TCO 2) A physical problem with a memory chip will often cause a(n) _____ error. Question 10. Question : (TCO 11) Bill and John are overloaded. They have to install more than 50 access points. Joni hears their frustration and offers to help. This is an example of _____. Devry Comp129 Week 3 Quiz 1. 1. Question : (TCO 4) Linux has a variety of _____ that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mvcommand for moving files, the vi editor for editing a text file, and so on. Student Answer: DOS commands utilities batch files GUI tools Instructor Explanation: TestOut Linux+ Section 0.1.3 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 4) What is a home screen on a mobile device? Student Answer: Where you have to be to see what applications are currently running Where the physical volume control is normally located Where photo files are stored Where app icons are found Instructor Explanation: Schmidt, Chapter 11 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 4) Consider the following directory structure from the C: drive root directory. 2014_Term (directory) CompRepair (subdirectory) Opsys (subdirectory) Cisco8 (subdirectory) VOIP (subdirectory) If the prompt is C:2014_Term> and you wanted to move into theCisco8 subdirectory, what command do you type? Student Answer: CD Cisco8 CD.. CD Cisco8 CD C:Cisco8 Instructor Explanation: Schmidt, Chapter 11 Points Received: 0 of 4 Comments: Question 4. Question : (TCO 4) List three items commonly found in a dialog box. Student Answer: Properties, Close button, Font button OK button, Cancel button, Make new file button Help button, Close button, OK button Help button, Close button, Restart button Instructor Explanation: Schmidt, Chapter 11 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware and configuration information for your computer? Student Answer: The System applet in Control Panel Msinfo32 Msconfig.exe Event Viewer Instructor Explanation: TestOut PC Pro Section 9 Points Received: 4 of 4 Comments: Question 6. Question : (TCO 4) Who is given credit for the GNU initiative? Student Answer: Richard Stallman Bill Gates Linus Torvald All of the above Instructor Explanation: TestOut Linux+ Section 0.1.3 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 4) Which user type was available in Windows XP but is not available for Windows Vista and 7? Student Answer: Guest Administrator Standard User Power User Instructor Explanation: Schmidt, Chapter 12 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 4) What Windows 7 feature speeds up file searches? Student Answer: Shadow Copy Indexing Sharing ReadyBoost Instructor Explanation: Schmidt, Chapter 12 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 4) What is the default location for 64-bit application files in Windows 7? Student Answer: The Windows folder The Program Files folder The SysWOW64 folder The System64 folder Instructor Explanation: Schmidt, Chapter 12 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) Learning the next-generation features of the most recent . october#”>smartphones is an example of _____. Student Answer: OS maintenance staying current with technology leveraging documentation working out a solution Instructor Explanation: Schmidt, Chapter 11 Points Received: 4 of 4 Comments: * Times are displayed in (GMT-07:00) Mountain Time (US & Canada) week 4 Devry CoMP129 Week 4 Quiz Latest 2015 October 1. 1. Question : (TCO 5) A laptop normally has an _____ type of hard drive installed. Student Answer: internal SCSI external SCSI external SATA internal SATA Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 6) Why is backing up data to a different partition on the same hard drive not a good idea? Student Answer: The data perform at a slower rate. Other users who have rights to save files can retrieve the backup, install to a different computer or drive, and potentially see others’ data. If the drive fails, both the data and the backup are potentially unusable. The backup takes longer. Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 6) Which backup type would back up all the user’s data and set the archive bit for each file? Student Answer: Comprehensive Full Differential Incremental Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Question 4. Question : (TCO 5) Which optical medium has the greatest storage capacity? Student Answer: Compact disc Dual-layer, single-sided DVD Single-layer, single-sided Blu-ray disc Dual-layer, double-sided DVD Instructor Explanation: TestOut PC Pro A+, Section 5.6 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 5) For internal optical drives, what is the most common type of internal interface found today? Student Answer: SCSI IDE USB Firewire Instructor Explanation: Schmidt, Chapter 8 Points Received: 4 of 4 Comments: Question 6. Question : (TCO 6) What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound? Student Answer: Analog-to-digital conversion rate Power rating Frequency response Signal to noise ratio Instructor Explanation: Schmidt, Chapter 8 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 5) What Android app could be used to see saved photos? Student Answer: Settings Gallery Photos Video Instructor Explanation: Schmidt, Chapter 8 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 5) What happens when you press the Fn key along with a function key on a laptop computer? Student Answer: You allow the computer to be placed in one of four power modes, which helps with video troubleshooting. You allow the computer to be placed in diagnostic mode, which is especially useful when troubleshooting video problems. You get additional features depending on the key you press. You refresh the monitor. Instructor Explanation: Schmidt, Chapter 9 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work area across two monitors. What would be the best solution for this user? Student Answer: Use an integrated VGA port and a DVI port on an adapter. Install a video card with two ports if two ports are not available on the motherboard. Use a KVM switch. Use a video splitter. Instructor Explanation: Schmidt, Chapter 9 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) What should you do when speaking on the phone with a customer who is very upset and yelling at you? Student Answer: Stay calm but raise your voice level a little to show the importance and professionalism of your technical question. Ask the caller whether you can put him or her on hold while he or she calms down. Hang up on the caller. Speak to the customer using a calm, professional tone. Instructor Explanation: Schmidt, Chapter 7 Points Received: 4 of 4 Comments: Devry Comp129 Week 6 Quiz 1. 1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____. Student Answer: Kerberos Crypto IP Encapsulation (CIPE) Internet Protocol Security (IPsec) Secure Sockets Layer (SSL) Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker. Student Answer: ExpressCard CardBus card PCI card PC Card Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 8) A worm _____. Student Answer: is a program that can replicate by attaching itself to another program can spread copies of itself throughout a network without a host program does not need a host program to work; It pretends to be a legitimate program is dormant code added to software and triggered by a predetermined event Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are. Student Answer: Authentication Authorization A background process BIOS settings Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____. Student Answer: Russian or Chinese hackers college students studying hacking employees leaving passwords in full view disgruntled employees Instructor Explanation: Week 6 Online Lecture Points Received: 0 of 4 Comments: Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used? Student Answer: Buy 1/0 rewrite software. Drill holes in the platters and smash the pieces with a hammer. Hold a magnet over each platter. Repartition the hard drive into multiple partitions using different file systems. Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols. Student Answer: user service encryption authentication authorization Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is? Student Answer: more pwd dir ls Instructor Explanation: TestOut Linux+, Section 1.1 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 9) What is SSID broadcasting? Student Answer: The method the access point uses to reach all wireless NICs with a single message A means for the access point to send the wireless encryption keys to all wireless NICs for network access The access point constantly sending the name of the wireless network into the air The access method used for 802.11 a, b, g, and n wireless networks Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) Trust between you and your customer begins with _____. Student Answer: never lying. good communications skills a new customer discount professionalism. Instructor Explanation: Schmidt, Chapter 15 Points Received: 0 of 4 Devry Comp129 Week 6 Quiz 1. 1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____. Student Answer: Kerberos Crypto IP Encapsulation (CIPE) Internet Protocol Security (IPsec) Secure Sockets Layer (SSL) Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker. Student Answer: ExpressCard CardBus card PCI card PC Card Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 3. Question : (TCO 8) A worm _____. Student Answer: is a program that can replicate by attaching itself to another program can spread copies of itself throughout a network without a host program does not need a host program to work; It pretends to be a legitimate program is dormant code added to software and triggered by a predetermined event Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are. Student Answer: Authentication Authorization A background process BIOS settings Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____. Student Answer: Russian or Chinese hackers college students studying hacking employees leaving passwords in full view disgruntled employees Instructor Explanation: Week 6 Online Lecture Points Received: 0 of 4 Comments: Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used? Student Answer: Buy 1/0 rewrite software. Drill holes in the platters and smash the pieces with a hammer. Hold a magnet over each platter. Repartition the hard drive into multiple partitions using different file systems. Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols. Student Answer: user service encryption authentication authorization Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is? Student Answer: more pwd dir ls Instructor Explanation: TestOut Linux+, Section 1.1 Points Received: 4 of 4 Comments: Question 9. Question : (TCO 9) What is SSID broadcasting? Student Answer: The method the access point uses to reach all wireless NICs with a single message A means for the access point to send the wireless encryption keys to all wireless NICs for network access The access point constantly sending the name of the wireless network into the air The access method used for 802.11 a, b, g, and n wireless networks Instructor Explanation: Schmidt, Chapter 15 Points Received: 4 of 4 Comments: Question 10. Question : (TCO 11) Trust between you and your customer begins with _____. Student Answer: never lying. good communications skills a new customer discount professionalism. Instructor Explanation: Schmidt, Chapter 15 Points Received: 0 of 4 Comments: week 7 (TCO 4) You have been asked to temporarily fill in for a Linux administrator who has just been fired. This administrator was known to take a lax view of security and it is suspected that passwords are still kept in the /etc/passwd file. When viewing that file, which entry below would indicate that the passwords are there? kolson:85yxir:430:0:Back Door:/root:/bin/bash badams:x:341:52:Brent Adams:/users/badams:/bin/bash dclifford:x:689:306:non secure user:/root: tmurphy:x:100:100:/users/tmurphy:/bin/bash Question 2. Question : (TCO 11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When he inserts the disc and closes the drive tray, the drive turns, but he does not hear any music. What type of problem would a technician say this is? The technician would say that it is a hardware problem. The technician would say that it is a software problem. The technician would say that it is an error of the user. The technician would not be able to draw a conclusion from the description given. Question 3. Question : (TCO 10) In which troubleshooting step do you complete a help-desk ticket by typing the solution and closing the ticket? Document findings, actions, and outcomes. Identify the problem. Verify full system functionality and, if applicable, implement preventive measures. Establish a plan of action to resolve the problem and implement the solution. Question 4. Question : (TCO 10) The audio beeps heard during the boot process are caused by the _____. RAM processor CMOS BIOS Question 5. Question : (TCO 10) Hardware errors are often obvious _____. during POST during printing when saving a file during RAM access Question 6. Question : (TCO 10) What component is most likely to be included in an audio and video editing PC design? RAID Powerful GPU Multiple processors Video capture card Question 7. Question : (TCO 10) Which of the following would most likely be a design consideration for a gaming PC rather than a computer used for virtualization? NAS High amount of RAM Multiple fast, large-capacity hard drives Additional system cooling Question 8. Question : (TCO 10) Debbie keeps getting an error each time she tries to save her worksheet in AJAX ABC accounting software to the thumb drive. She then saves an Excel spreadsheet she was working on to the thumb drive and it too produces the error. A good next step would be to _____. save the file to a different drive. open the computer case to see whether the thumb drive is connected properly. replace the hard drive. Question 9. Question : (TCO 10) Which statement is true regarding mobile design? . Netbooks are low cost and lightweight. Netbooks are typically lighter than tablets. Laptops usually have less storage capability than tablets or smartphones. Question 10. Question : (TCO 10) An internal keyboard is generally connected to the laptop’s system board using a _____. USB connector ribbon cable PS/2 port mini-molex connector Course Project: Due in Week 7 (Begin in Week 1) Objectives .equella.ecollege.com/file/fe25679a-cc25-4079-a28b-289fa1484619/19/COMP129_CH_CourseProject.html#top”>Back to Top BUILDING A PERFECT PC! The COMP129 project is designed to help you apply what you are learning each week using current hardware and software options to build a PC that meets a specific purpose. Although your Final Project is due in Week 7, you will begin working in Week 1 and continue adding components to your computer in each week of the class. Start by selecting the purpose of your computer and a budget. Then you can work each week to select components for your PC based on what you are learning in your class activities. Download the project deliverable template and create a spreadsheet in Week 1. (Remember, you will be turning in these two files in Week 7.) Build on these during the term as you work on building your perfect PC. Guidelines Plan to build your perfect PC. (Remember, you are to select each part of the computer. No kits are allowed. No prebuilt computing devices are allowed. This project is designed to help you apply what you are learning each week using current hardware and software options.) Use the lab project template to turn in your project questions. Attach an Excel spreadsheet that includes the major components, specifications, parts, vendors, pricing, and total cost as outlined below. (You can add additional rows and columns to the Excel template if you want to add more than the minimum in your completed computer build). 1. Plan the purpose of your computer. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.) 2. Preplan a price range and try to stick to it. (Were you able to stick to your budget? Why or why not?) 3. List all major components in your spreadsheet template. (Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed). 4. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.) 5. Include OS and software. 6. Update an Excel spreadsheet with all specifications and parts. 7. Price parts from two locations. You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such as.newegg.com/”>newegg.comor.tigerdirect.com/”>http://www.tigerdirect.com/. You can do all of your .comparison shopping online, if you desire. (You will be adding in the prices from these two locations as separate columns in your spreadsheet. See Item 8 below.) 8. Update your spreadsheet with the seller’s name, prices, and totals. (Make sure you add the vendor, price, and total for all the items you select, as well as the total for the computer as a whole.) 9. Write a 4–5-paragraph report on your learning and experiences in completing this project. Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay. http://www.homeworkarena.com/ Tags: Devry Comp 129 Full Course, Devry Comp 129, comp129 entire course

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close