Devry
Comp 129 Full Course
Devry
Comp 129 Week 1 Discussion
Discussion
1
In this discussion, we
will look at the basics of both hardware and operating systems. To begin this
discussion, let’s first define the difference between hardware and software.
What is hardware? What is software? What are the purposes of hardware and
software?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Discussion
2
In this discussion, we
will look at power supplies and form factors. What is the purpose of a power
supply? What is a form factor? How do power supplies and form factors relate to
one another?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry
Comp 129 Week 2 Discussion
Discussion
1
Take some time this
week to open up your computer (or better yet, an old junky one), and take a
look inside (be sure to unplug your machine and not to touch any of the
components—look but don’t touch). Based on your readings, what kind of
motherboard is being used? What form factor? How did you know?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Discussion
2
What is a CPU? What is
the purpose of the CPU?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry
Comp129 Week 3 Discussion
Discussion
1
Describe the Windows
operating system. Discuss some of your favorite Windows features.
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts
Discussion
2
Have you ever had a
problem with your Windows operating system? What happened, and what was the
result?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry
Comp129 Week 4 Discussion
Discussion
1
Identify and discuss
some peripherals that ordinary desktop PC users would normally use. Discuss how
they work and their purposes.
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Discussion
2
Discuss backup
strategies and devices that you can use with your PC at home or in the
workplace. How does the device connect? What standards does it use?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry
COMP129 Week 5 Discussion
Discussion
1
What are the basic
components required to set up a network? How do you add a PC to a network?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Discussion
2
What is one of your
favorite applications that utilizes the Internet? Discuss what happens behind
the scenes in the network that enables your PC to implement that application.
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry
COMP 129 Week 6 Discussion
Discussion 1
Discussion 1
What are some of the
basic precautions a computer owner or network administrator can take to help
make the computing environment secure? What are some of the basic security
threats that a user or administrator might have to face?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Discussion
2
What is Linux? When
would you use it? How does it differ from Windows? Are there different versions
of Linux?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry COMP 129 Week 7 Discussion
Devry COMP 129 Week 7 Discussion
Discussion 1
What is
troubleshooting? How can you find the cause(s) of the problem quickly when you
have limited experience? Why is it important to keep a computer healthy?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
discussion
2
We have studied the
CLI for both Windows and Linux. The real power in using commands comes with
scripting. What are some repetitive tasks you can think of that could be done
more easily with a well-written script?
Avoid using the
Respond button at the top of the discussion. Help keep the discussion organized
by responding only to other posts.
Devry COMP 129 All Weeks quizzes
Devry COMP 129 All Weeks quizzes
week 1
- 1.
Question : (TCO 2) Why is having the correct device driver so important?
Question
2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port?
Question
3. Question : (TCO 2) What is the primary purpose of the power supply?
Question
4. Question : (TCO 2) What atmospheric condition
can
increase the potential for static electricity?
Question
5. Question : (TCO 2) A _____ is required
before
software from the BIOS is executed.
Question
6. Question : (TCO 2) Which unit would you recommend for the help desk people
who sit at a computer for a 24/7 operation where help must be provided at all
times?
Question
7. Question : (TCO 1) Refer to the provided figure. What type of cable would
have this symbol?
Question
8. Question : (TCO 1) Jane decides to restart her computer by pressing the
Ctrl+Alt+Delete combination keys. This procedure
is
called a _____.
Question
9. Question : (TCO 1) Why is it best not to start cleaning a computer by using
compressed
air?
Question
10. Question : (TCO 11) After a problem is solved, a technician must _____
findings, actions, and outcomes.
Devry
Comp129 Week 2 Quiz
- 1.
Question : (TCO 3) Major microprocessor manufacturers are _____.
Question
2. Question : (TCO 3) What does quad core mean in relation of processors?
Question
3. Question : (TCO 3) An engineering professor teaches CAS at the university.
Which expansion slot would be best for the graphics card in the professor’s
computer?
Question
4. Question : (TCO 3) Most motherboards use _____ for RAM.
Question
5. Question : (TCO 3) Double-sided memory _____.
Question
6. Question : (TCO 3) Dual channeling _____.
Question
7. Question : (TCO 3) Where are mini PCIe cards normally installed?
Question
8. Question : (TCO 2) Which of
the following will most likely contain SO-DIMM memory?
Question
9. Question : (TCO 2) A physical problem with a memory chip will often cause
a(n) _____ error.
Question
10. Question : (TCO 11) Bill and John are overloaded. They have to install more
than 50 access points. Joni hears their frustration and offers to help. This is
an example of _____.
Devry
Comp129 Week 3 Quiz
- 1.
Question : (TCO 4) Linux has a variety of _____ that provide the basic
functionality that you are used to when working with an operating system,
such as the cp command for copying files, the mvcommand for moving files,
the vi editor for editing a text file, and so on.
Student Answer: DOS
commands
utilities
batch files
GUI tools
Instructor
Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of
4
Comments:
Question
2. Question : (TCO 4) What is a home screen on a mobile device?
Student Answer: Where
you have to be to see what applications are currently running
Where the physical
volume control is normally located
Where photo files are
stored
Where app icons are
found
Instructor
Explanation: Schmidt, Chapter 11
Points Received: 4 of
4
Comments:
Question
3. Question : (TCO 4) Consider the following directory structure from the C:
drive root directory.
2014_Term
(directory)
CompRepair
(subdirectory)
Opsys
(subdirectory)
Cisco8
(subdirectory)
VOIP
(subdirectory)
If
the prompt is C:2014_Term> and you wanted to move into theCisco8
subdirectory,
what
command
do you type?
Student
Answer: CD Cisco8
CD..
CD
Cisco8
CD
C:Cisco8
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 0 of 4
Comments:
Question
4. Question : (TCO 4) List three items commonly found in a dialog box.
Student
Answer: Properties, Close button, Font button
OK
button,
Cancel
button, Make new file button
Help
button, Close button, OK button
Help
button, Close button, Restart button
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 4 of 4
Comments:
Question
5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware
and configuration information for your computer?
Student
Answer: The System applet in Control Panel
Msinfo32
Msconfig.exe
Event
Viewer
Instructor
Explanation: TestOut PC Pro Section 9
Points
Received: 4 of 4
Comments:
Question
6. Question : (TCO 4) Who is given credit for the GNU initiative?
Student
Answer: Richard Stallman
Bill
Gates
Linus
Torvald
All
of the above
Instructor
Explanation: TestOut Linux+ Section 0.1.3
Points
Received: 4 of 4
Comments:
Question
7. Question : (TCO 4) Which user type was available
in
Windows XP but is not available
for
Windows Vista and 7?
Student
Answer: Guest
Administrator
Standard
User
Power
User
Instructor
Explanation: Schmidt, Chapter 12
Points
Received: 4 of 4
Comments:
Question
8. Question : (TCO 4) What Windows 7 feature speeds up file searches?
Student
Answer: Shadow Copy
Indexing
Sharing
ReadyBoost
Instructor
Explanation: Schmidt, Chapter 12
Points
Received: 4 of 4
Comments:
Question
9. Question : (TCO 4) What is the default location for 64-bit application files
in Windows 7?
Student
Answer: The Windows folder
The
Program Files folder
The
SysWOW64 folder
The
System64 folder
Instructor
Explanation: Schmidt, Chapter 12
Points
Received: 4 of 4
Comments:
Question
10. Question : (TCO 11) Learning the next-generation features of the most
recent . october#”>smartphones is an example of _____.
Student
Answer: OS maintenance
staying
current with technology
leveraging
documentation
working
out a solution
Instructor
Explanation: Schmidt, Chapter 11
Points
Received: 4 of 4
Comments:
*
Times are displayed in (GMT-07:00) Mountain Time (US & Canada)
week
4
Devry
CoMP129 Week 4 Quiz Latest 2015 October
- 1.
Question : (TCO 5) A laptop normally has an _____ type of hard drive
installed.
Student
Answer: internal SCSI
external
SCSI
external
SATA
internal
SATA
Instructor
Explanation: Schmidt, Chapter 7
Points
Received: 4 of 4
Comments:
Question
2. Question : (TCO 6) Why is backing up data to a different partition on the
same hard drive not a good idea?
Student
Answer: The data perform at a slower rate.
Other
users who have rights to save files can retrieve the backup, install to a
different computer or drive, and potentially see others’ data.
If
the drive fails, both the data and the backup are potentially unusable.
The
backup takes longer.
Instructor
Explanation: Schmidt, Chapter 7
Points
Received: 4 of 4
Comments:
Question
3. Question : (TCO 6) Which backup type would back up all the user’s data and
set the archive bit for each file?
Student
Answer: Comprehensive
Full
Differential
Incremental
Instructor
Explanation: Schmidt, Chapter 7
Points
Received: 4 of 4
Comments:
Question
4. Question : (TCO 5) Which optical medium has the greatest storage capacity?
Student
Answer: Compact disc
Dual-layer,
single-sided DVD
Single-layer,
single-sided Blu-ray disc
Dual-layer,
double-sided DVD
Instructor
Explanation: TestOut PC Pro A+, Section 5.6
Points
Received: 4 of 4
Comments:
Question
5. Question : (TCO 5) For internal optical drives, what is the most common type
of internal interface found today?
Student
Answer: SCSI
IDE
USB
Firewire
Instructor
Explanation: Schmidt, Chapter 8
Points
Received: 4 of 4
Comments:
Question
6. Question : (TCO 6) What term is used to describe the number of samples a
sound card takes to create the reproduction of the original sound?
Student
Answer: Analog-to-digital conversion rate
Power
rating
Frequency
response
Signal
to noise ratio
Instructor
Explanation: Schmidt, Chapter 8
Points
Received: 4 of 4
Comments:
Question
7. Question : (TCO 5) What Android app could be used to see saved photos?
Student
Answer: Settings
Gallery
Photos
Video
Instructor
Explanation: Schmidt, Chapter 8
Points
Received: 4 of 4
Comments:
Question
8. Question : (TCO 5) What happens when you press the Fn key along
with
a function key on a laptop computer?
Student
Answer: You allow the computer
to
be placed in one of four power modes, which helps with video troubleshooting.
You
allow the computer
to
be placed in diagnostic
mode,
which is especially useful when troubleshooting video problems.
You
get additional features depending
on
the key you press.
You
refresh the monitor.
Instructor
Explanation: Schmidt, Chapter 9
Points
Received: 4 of 4
Comments:
Question
9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work
area across two monitors.
What
would be the best solution for this user?
Student
Answer: Use an integrated VGA port and a DVI port on an adapter.
Install
a video card with two ports if two ports are not available on the motherboard.
Use
a KVM switch.
Use
a video splitter.
Instructor
Explanation: Schmidt, Chapter 9
Points
Received: 4 of 4
Comments:
Question
10. Question : (TCO 11) What should you do when speaking on the phone with a
customer who is very upset and yelling at you?
Student
Answer: Stay calm but raise your voice level a little to show the importance
and professionalism of your technical question.
Ask
the caller whether you can put him or her on hold while he or she calms down.
Hang
up on the caller.
Speak
to the customer using a calm, professional tone.
Instructor
Explanation: Schmidt, Chapter 7
Points
Received: 4 of 4
Comments:
Devry
Comp129 Week 6 Quiz
- 1. Question : (TCO 8) The
protocols used to encrypt account names and passwords are called
authentication protocols. The protocol used for Windows is _____.
Student Answer:
Kerberos
Crypto IP
Encapsulation (CIPE)
Internet Protocol
Security (IPsec)
Secure Sockets Layer
(SSL)
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 2. Question :
(TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer:
ExpressCard
CardBus card
PCI card
PC Card
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 3. Question :
(TCO 8) A worm _____.
Student Answer: is a
program that can replicate by attaching itself to another program
can spread copies of
itself throughout a network without a host program
does not need a host
program to work; It pretends to be a legitimate program
is dormant code added
to software and triggered by a predetermined event
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 4. Question :
(TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer:
Authentication
Authorization
A background process
BIOS settings
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 5. Question :
(TCO 8) The largest security risk for stealing confidential data comes from
____.
Student Answer:
Russian or Chinese hackers
college students
studying hacking
employees leaving
passwords in full view
disgruntled employees
Instructor
Explanation: Week 6 Online Lecture
Points Received: 0 of
4
Comments:
Question 6. Question :
(TCO 8) Which security method would be best to use if extremely sensitive
government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0
rewrite software.
Drill holes in the
platters and smash the pieces with a hammer.
Hold a magnet over
each platter.
Repartition the hard
drive into multiple partitions using different file systems.
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 7. Question :
(TCO 8) The protocols used to encrypt account names and passwords are called
_____ protocols.
Student Answer: user
service
encryption
authentication
authorization
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 8. Question :
(TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor
Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of
4
Comments:
Question 9. Question :
(TCO 9) What is SSID broadcasting?
Student Answer: The
method the access point uses to reach all wireless NICs with a single message
A means for the access
point to send the wireless encryption keys to all wireless NICs for network
access
The access point
constantly sending the name of the wireless network into the air
The access method used
for 802.11 a, b, g, and n wireless networks
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 4 of
4
Comments:
Question 10. Question
: (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never
lying.
good communications
skills
a new customer
discount
professionalism.
Instructor
Explanation: Schmidt, Chapter 15
Points Received: 0 of
4
Devry
Comp129 Week 6 Quiz
- 1.
Question : (TCO 8) The protocols used to encrypt account names and
passwords are called authentication protocols. The protocol used for
Windows is _____.
Student
Answer: Kerberos
Crypto
IP Encapsulation (CIPE)
Internet
Protocol Security (IPsec)
Secure
Sockets Layer (SSL)
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but
thicker.
Student
Answer: ExpressCard
CardBus
card
PCI
card
PC
Card
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
3. Question : (TCO 8) A worm _____.
Student
Answer: is a program that can replicate by attaching itself to another program
can
spread copies of itself throughout a network without a host program
does
not need a host program to work; It pretends to be a legitimate program
is
dormant code added to software and triggered by a predetermined event
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
4. Question : (TCO 8) _____ prove(s) that individuals are who they say they
are.
Student
Answer: Authentication
Authorization
A
background process
BIOS
settings
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
5. Question : (TCO 8) The largest security risk for stealing confidential data
comes from ____.
Student
Answer: Russian or Chinese hackers
college
students studying hacking
employees
leaving passwords in full view
disgruntled
employees
Instructor
Explanation: Week 6 Online Lecture
Points
Received: 0 of 4
Comments:
Question
6. Question : (TCO 8) Which security method would be best to use if extremely
sensitive government information were stored on a hard drive that will no
longer be used?
Student
Answer: Buy 1/0 rewrite software.
Drill
holes in the platters and smash the pieces with a hammer.
Hold
a magnet over each platter.
Repartition
the hard drive into multiple partitions using different file systems.
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
7. Question : (TCO 8) The protocols used to encrypt account names and passwords
are called _____ protocols.
Student
Answer: user service
encryption
authentication
authorization
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
8. Question : (TCO 4) Which Linux command shows you what the current directory
is?
Student
Answer: more
pwd
dir
ls
Instructor
Explanation: TestOut Linux+, Section 1.1
Points
Received: 4 of 4
Comments:
Question
9. Question : (TCO 9) What is SSID broadcasting?
Student
Answer: The method the access point uses to reach all wireless NICs with a
single message
A
means for the access point to send the wireless encryption keys to all wireless
NICs for network access
The
access point constantly sending the name of the wireless network into the air
The
access method used for 802.11 a, b, g, and n wireless networks
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 4 of 4
Comments:
Question
10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student
Answer: never lying.
good
communications skills
a
new customer discount
professionalism.
Instructor
Explanation: Schmidt, Chapter 15
Points
Received: 0 of 4
Comments:
week
7
(TCO
4) You have been asked to temporarily fill in for a Linux administrator who has
just been fired. This administrator was known to take a lax view of security
and it is suspected that passwords are still kept in the /etc/passwd file. When
viewing that file, which entry below would indicate that the passwords are
there?
kolson:85yxir:430:0:Back
Door:/root:/bin/bash
badams:x:341:52:Brent
Adams:/users/badams:/bin/bash
dclifford:x:689:306:non
secure user:/root:
tmurphy:x:100:100:/users/tmurphy:/bin/bash
Question
2. Question :
(TCO
11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When
he inserts the disc and closes the drive tray, the drive turns, but he does not
hear any music. What type of problem would a technician say this is?
The
technician would say that it is a hardware problem.
The
technician would say that it is a software problem.
The
technician would say that it is an error of the user.
The
technician would not be able to draw a conclusion from the description given.
Question
3. Question :
(TCO
10) In which troubleshooting step do you complete a help-desk ticket by typing
the solution and closing the ticket?
Document
findings, actions, and outcomes.
Identify
the problem.
Verify
full system functionality and, if applicable, implement preventive measures.
Establish
a plan of action to resolve the problem and implement the solution.
Question
4. Question :
(TCO
10) The audio beeps heard during the boot process are caused by the _____.
RAM
processor
CMOS
BIOS
Question
5. Question :
(TCO
10) Hardware errors are often obvious _____.
during
POST
during
printing
when
saving a file
during
RAM access
Question
6. Question :
(TCO
10) What component is most likely to be included in an audio and video editing
PC design?
RAID
Powerful
GPU
Multiple
processors
Video
capture card
Question
7. Question :
(TCO
10) Which of the following would most likely be a design consideration for a
gaming PC rather than a computer used for virtualization?
NAS
High
amount of RAM
Multiple
fast, large-capacity hard drives
Additional
system cooling
Question
8. Question :
(TCO
10) Debbie keeps getting an error each time she tries to save her worksheet in
AJAX ABC accounting software to the thumb drive. She then saves an Excel spreadsheet
she was working on to the thumb drive and it too produces the error. A good
next step would be to _____.
save
the file to a different drive.
open
the computer case to see whether the thumb drive is connected properly.
replace
the hard drive.
Question
9. Question :
(TCO
10) Which statement is true regarding mobile design?
.
Netbooks are low cost and lightweight.
Netbooks
are typically lighter than tablets.
Laptops
usually have less storage capability than tablets or smartphones.
Question
10. Question :
(TCO
10) An internal keyboard is generally connected to the laptop’s system board
using a _____.
USB
connector
ribbon
cable
PS/2
port
mini-molex
connector
Course
Project: Due in Week 7 (Begin in Week 1)
Objectives
.equella.ecollege.com/file/fe25679a-cc25-4079-a28b-289fa1484619/19/COMP129_CH_CourseProject.html#top”>Back
to Top
BUILDING
A PERFECT PC!
The COMP129 project is
designed to help you apply what you are learning each week using current
hardware and software options to build a PC that meets a specific purpose.
Although your Final Project is due in Week 7, you will begin working in Week 1
and continue adding components to your computer in each week of the class.
Start by selecting the purpose of your computer and a budget. Then you can work
each week to select components for your PC based on what you are learning in
your class activities. Download the project deliverable template and create a
spreadsheet in Week 1. (Remember, you will be turning in
these two files in Week 7.) Build on these during the term as you work on
building your perfect PC.
Guidelines
Plan to build your
perfect PC. (Remember, you are to select each part of the computer. No kits are
allowed. No prebuilt computing devices are allowed. This project is designed to
help you apply what you are learning each week using current hardware and
software options.) Use the lab project template to turn in your project
questions. Attach an Excel spreadsheet that includes the major components,
specifications, parts, vendors, pricing, and total cost as outlined below. (You
can add additional rows and columns to the Excel template if you want to add
more than the minimum in your completed computer build).
- Plan the purpose of your
computer. (Remember, Chapter 10 in your textbook will give you some ideas
on what you might select as a purpose.)
- Preplan a price range and try
to stick to it. (Were you able to stick to your budget? Why or why not?)
- List all major components in
your spreadsheet template. (Include at least the motherboard, processor
power, memory, drives, and monitor size. Add to this list as needed).
- Determine all necessary parts
to buy. (Include at least the case, expansion cards, NIC, and keyboard.
Add to this list as needed.)
- Include OS and software.
- Update an Excel spreadsheet
with all specifications and parts.
- Price parts from two locations.
You may use brick-and-mortar stores in your area, such as TigerDirect, and
online sellers, such
as.newegg.com/”>newegg.comor.tigerdirect.com/”>http://www.tigerdirect.com/.
You can do all of your .comparison shopping online, if you desire. (You
will be adding in the prices from these two locations as separate columns
in your spreadsheet. See Item 8 below.)
- Update your spreadsheet with
the seller’s name, prices, and totals. (Make sure you add the vendor,
price, and total for all the items you select, as well as the total for
the computer as a whole.)
- Write a 4–5-paragraph report on
your learning and experiences in completing this project. Make sure to
include an introduction, two to three paragraphs about the project, and a
conclusion for full credit on this part of the assignment. Remember, this
portion of the project is worth 10 points, so make sure you are thorough
and complete in your essay.
No comments:
Post a Comment