Product Description
Comp129 full course latest [ all discussions all Quiz and course proj ]
Devry Comp129 Week 1, Discusssion 1 & 2 Letast 2015 october
Disussion 1
Devry Comp129 Week 1, Discusssion 1 & 2 Letast 2015 october
Disussion 1
In this discussion, we will look at the basics of both hardware and operating systems. To begin this discussion, let’s first define the difference between hardware and software. What is hardware? What is software? What are the purposes of hardware and software?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
In this discussion, we will look at power supplies and form factors. What is the purpose of a power supply? What is a form factor? How do power supplies and form factors relate to one another?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Devry Comp129 Week 2, Discusssion 1 & 2 Letast 2015 october
Discussion 1
Take some time this week to open up your computer (or better yet, an old junky one), and take a look inside (be sure to unplug your machine and not to touch any of the components—look but don’t touch). Based on your readings, what kind of motherboard is being used? What form factor? How did you know?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Take some time this week to open up your computer (or better yet, an old junky one), and take a look inside (be sure to unplug your machine and not to touch any of the components—look but don’t touch). Based on your readings, what kind of motherboard is being used? What form factor? How did you know?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
What is a CPU? What is the purpose of the CPU?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
What is a CPU? What is the purpose of the CPU?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Devry Comp129 Week 3 Discusssion 1 & 2 Letast 2015 october
Dicussion 1
Describe the Windows operating system. Discuss some of your favorite Windows features.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts
Discussion 2
Have you ever had a problem with your Windows operating system? What happened, and what was the result?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Have you ever had a problem with your Windows operating system? What happened, and what was the result?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Devry Comp129 Week 4 Discusssion 1 & 2 Letast 2015 october
Discussion 1
Identify and discuss some peripherals that ordinary desktop PC users would normally use. Discuss how they work and their purposes.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
Discuss backup strategies and devices that you can use with your PC at home or in the workplace. How does the device connect? What standards does it use?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discuss backup strategies and devices that you can use with your PC at home or in the workplace. How does the device connect? What standards does it use?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 1
What are the basic components required to set up a network? How do you add a PC to a network?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
What is one of your favorite applications that utilizes the Internet? Discuss what happens behind the scenes in the network that enables your PC to implement that application.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
What is one of your favorite applications that utilizes the Internet? Discuss what happens behind the scenes in the network that enables your PC to implement that application.
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 1
What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 2
What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Discussion 1
What is troubleshooting? How can you find the cause(s) of the problem quickly when you have limited experience? Why is it important to keep a computer healthy?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
What is troubleshooting? How can you find the cause(s) of the problem quickly when you have limited experience? Why is it important to keep a computer healthy?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
discussion 2
We have studied the CLI for both Windows and Linux. The real power in using commands comes with scripting. What are some repetitive tasks you can think of that could be done more easily with a well-written script?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
We have studied the CLI for both Windows and Linux. The real power in using commands comes with scripting. What are some repetitive tasks you can think of that could be done more easily with a well-written script?
Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
quizes
wek 1
1. Question : (TCO 2) Why is having the correct device driver so important?
Student Answer: It enables a specific operating system to run as multiple machines.
It enables multiple computers to share devices.
It enables a device to work in both a powered and unpowered state.
It enables a specific operating system to control a specific piece of hardware.
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port?
Student Answer: 1.5 Mbps
3 Mbps
10 Mbps
480 Mbps
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 2) What is the primary purpose of the power supply?
Student Answer: Controls internal computer temperature
Converts AC to DC
Provides power to external devices
Supplies AC electricity to the computer parts
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 2) What atmospheric condition
can increase the potential for static electricity?
Student Answer: High temperatures
Low temperatures
Low humidity
None; atmospheric conditions have little impact on static electricity
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 2) A _____ is required
before software from the BIOS is executed.
Student Answer: power good signal
password
surge protector good signal
power down signal
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 2) Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times?
Student Answer: A UPS
A surge protector
An upgrade power supply
A line conditioner
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 1) Refer to the provided figure. What type of cable would have this symbol?
Student Answer: Radio frequency (RF)
USB 3.0
Bluetooth
FireWire
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 1) Jane decides to restart her computer by pressing the Ctrl+Alt+Delete combination keys. This procedure
is called a _____.
Student Answer: shutdown
warm boot
quick start
mistake
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 1) Why is it best not to start cleaning a computer by using compressed
air?
Student Answer: Some people may be sensitive to the dust blown into the air.
Pressure may damage the fragile electronic
equipment.
Heavy dirt cannot be moved by the compressed air.
The turbulence from the compressed air causes an RFI disturbance.
Instructor Explanation: Schmidt, Chapter 4
Points Received: 0 of 4
Comments:
Question 10. Question : (TCO 11) After a problem is solved, a technician must _____ findings, actions, and outcomes.
Student Answer: tell his or her boss the
document
memorize
e-mail
Instructor Explanation: Schmidt, Soft Skills, Ch.4
Points Received: 4 of 4
Comments:
1. Question : (TCO 2) Why is having the correct device driver so important?
Student Answer: It enables a specific operating system to run as multiple machines.
It enables multiple computers to share devices.
It enables a device to work in both a powered and unpowered state.
It enables a specific operating system to control a specific piece of hardware.
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port?
Student Answer: 1.5 Mbps
3 Mbps
10 Mbps
480 Mbps
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 2) What is the primary purpose of the power supply?
Student Answer: Controls internal computer temperature
Converts AC to DC
Provides power to external devices
Supplies AC electricity to the computer parts
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 2) What atmospheric condition
can increase the potential for static electricity?
Student Answer: High temperatures
Low temperatures
Low humidity
None; atmospheric conditions have little impact on static electricity
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 2) A _____ is required
before software from the BIOS is executed.
Student Answer: power good signal
password
surge protector good signal
power down signal
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 2) Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times?
Student Answer: A UPS
A surge protector
An upgrade power supply
A line conditioner
Instructor Explanation: Schmidt, Chapter 4
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 1) Refer to the provided figure. What type of cable would have this symbol?
Student Answer: Radio frequency (RF)
USB 3.0
Bluetooth
FireWire
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 1) Jane decides to restart her computer by pressing the Ctrl+Alt+Delete combination keys. This procedure
is called a _____.
Student Answer: shutdown
warm boot
quick start
mistake
Instructor Explanation: Schmidt, Chapter 1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 1) Why is it best not to start cleaning a computer by using compressed
air?
Student Answer: Some people may be sensitive to the dust blown into the air.
Pressure may damage the fragile electronic
equipment.
Heavy dirt cannot be moved by the compressed air.
The turbulence from the compressed air causes an RFI disturbance.
Instructor Explanation: Schmidt, Chapter 4
Points Received: 0 of 4
Comments:
Question 10. Question : (TCO 11) After a problem is solved, a technician must _____ findings, actions, and outcomes.
Student Answer: tell his or her boss the
document
memorize
Instructor Explanation: Schmidt, Soft Skills, Ch.4
Points Received: 4 of 4
Comments:
Devry Comp129 Wee
k 2 Quiz Letast 2015 october
1. Question : (TCO 3) Major microprocessor manufacturers are _____.
Student Answer: Apple, Gateway, and Dell
Intel, Motorola, and AMD
Maxtor, Seagate, and Sony
Microsoft, 3-Com, and Oracle
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 3) What does quad core mean in relation of processors?
Student Answer: The main CPU is clocked at four times the static rate.
Four processors are installed in one or two sockets on the motherboard.
Four pipelines are used inside the processor for simultaneous instruction execution.
Four core system processes can be executed upon simultaneously.
Instructor Explanation: Schmidt, Chapter 2
Points Received: 0 of 4
Comments:
Question 3. Question : (TCO 3) An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor’s computer?
Student Answer: PCI
PCI-X
AGP
PCIe
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 3) Most motherboards use _____ for RAM.
Student Answer: DIMMs
RIMMs
VCMs
DIPs
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 3) Double-sided memory _____.
Student Answer: is two memory modules in the same physical module
is required to do dual-channeling
is most often used with Rambus
provides faster throughput
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 3) Dual channeling _____.
Student Answer: requires more cache memory
requires more RAM
requires dual CPUs
requires matched modules
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 3) Where are mini PCIe cards normally installed?
Student Answer: In tablet computers
In smartphones
On the bottom of a laptop
In a slot adjacent to the processor
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 2) Which of the following will most likely contain SO-DIMM memory?
Student Answer: Servers
Desktop workstations
Notebook computers
Printers
Instructor Explanation: Week 2 Lecture and LabSims
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 2) A physical problem with a memory chip will often cause a(n) _____ error.
Student Answer: out of memory
bad sector
POST
Task Manager
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Bill and John are overloaded. They have to install more than 50 access points. Joni hears their frustration and offers to help. This is an example of _____.
Student Answer: tag teaming
consolidation
teamwork
outsourcing
Instructor Explanation: Schmidt, Soft Skills, Chapter 6
Points Received: 4 of 4
Comments:
1. Question : (TCO 3) Major microprocessor manufacturers are _____.
Student Answer: Apple, Gateway, and Dell
Intel, Motorola, and AMD
Maxtor, Seagate, and Sony
Microsoft, 3-Com, and Oracle
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 3) What does quad core mean in relation of processors?
Student Answer: The main CPU is clocked at four times the static rate.
Four processors are installed in one or two sockets on the motherboard.
Four pipelines are used inside the processor for simultaneous instruction execution.
Four core system processes can be executed upon simultaneously.
Instructor Explanation: Schmidt, Chapter 2
Points Received: 0 of 4
Comments:
Question 3. Question : (TCO 3) An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor’s computer?
Student Answer: PCI
PCI-X
AGP
PCIe
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 3) Most motherboards use _____ for RAM.
Student Answer: DIMMs
RIMMs
VCMs
DIPs
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 3) Double-sided memory _____.
Student Answer: is two memory modules in the same physical module
is required to do dual-channeling
is most often used with Rambus
provides faster throughput
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 3) Dual channeling _____.
Student Answer: requires more cache memory
requires more RAM
requires dual CPUs
requires matched modules
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 3) Where are mini PCIe cards normally installed?
Student Answer: In tablet computers
In smartphones
On the bottom of a laptop
In a slot adjacent to the processor
Instructor Explanation: Schmidt, Chapter 2
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 2) Which of the following will most likely contain SO-DIMM memory?
Student Answer: Servers
Desktop workstations
Notebook computers
Printers
Instructor Explanation: Week 2 Lecture and LabSims
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 2) A physical problem with a memory chip will often cause a(n) _____ error.
Student Answer: out of memory
bad sector
POST
Task Manager
Instructor Explanation: Schmidt, Chapter 6
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Bill and John are overloaded. They have to install more than 50 access points. Joni hears their frustration and offers to help. This is an example of _____.
Student Answer: tag teaming
consolidation
teamwork
outsourcing
Instructor Explanation: Schmidt, Soft Skills, Chapter 6
Points Received: 4 of 4
Comments:
Devry Comp129 Week 3 Quiz Letast 2015 october
1. Question : (TCO 4) Linux has a variety of _____ that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mvcommand for moving files, the vi editor for editing a text file, and so on.
Student Answer: DOS commands
utilities
batch files
GUI tools
Instructor Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 4) What is a home screen on a mobile device?
Student Answer: Where you have to be to see what applications are currently running
Where the physical volume control is normally located
Where photo files are stored
Where app icons are found
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 4) Consider the following directory structure from the C: drive root directory.
2014_Term (directory)
CompRepair (subdirectory)
Opsys (subdirectory)
Cisco8 (subdirectory)
VOIP (subdirectory)
If the prompt is C:2014_Term> and you wanted to move into theCisco8
subdirectory, what
command do you type?
Student Answer: CD Cisco8
CD..
CD Cisco8
CD C:Cisco8
Instructor Explanation: Schmidt, Chapter 11
Points Received: 0 of 4
Comments:
Question 4. Question : (TCO 4) List three items commonly found in a dialog box.
Student Answer: Properties, Close button, Font button
OK button,
Cancel button, Make new file button
Help button, Close button, OK button
Help button, Close button, Restart button
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware and configuration information for your computer?
Student Answer: The System applet in Control Panel
Msinfo32
Msconfig.exe
Event Viewer
Instructor Explanation: TestOut PC Pro Section 9
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 4) Who is given credit for the GNU initiative?
Student Answer: Richard Stallman
Bill Gates
Linus Torvald
All of the above
Instructor Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 4) Which user type was available
in Windows XP but is not available
for Windows Vista and 7?
Student Answer: Guest
Administrator
Standard User
Power User
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) What Windows 7 feature speeds up file searches?
Student Answer: Shadow Copy
Indexing
Sharing
ReadyBoost
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 4) What is the default location for 64-bit application files in Windows 7?
Student Answer: The Windows folder
The Program Files folder
The SysWOW64 folder
The System64 folder
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Learning the next-generation features of the most recent smartphones is an example of _____.
Student Answer: OS maintenance
staying current with technology
leveraging documentation
working out a solution
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)
1. Question : (TCO 4) Linux has a variety of _____ that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mvcommand for moving files, the vi editor for editing a text file, and so on.
Student Answer: DOS commands
utilities
batch files
GUI tools
Instructor Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 4) What is a home screen on a mobile device?
Student Answer: Where you have to be to see what applications are currently running
Where the physical volume control is normally located
Where photo files are stored
Where app icons are found
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 4) Consider the following directory structure from the C: drive root directory.
2014_Term (directory)
CompRepair (subdirectory)
Opsys (subdirectory)
Cisco8 (subdirectory)
VOIP (subdirectory)
If the prompt is C:2014_Term> and you wanted to move into theCisco8
subdirectory, what
command do you type?
Student Answer: CD Cisco8
CD..
CD Cisco8
CD C:Cisco8
Instructor Explanation: Schmidt, Chapter 11
Points Received: 0 of 4
Comments:
Question 4. Question : (TCO 4) List three items commonly found in a dialog box.
Student Answer: Properties, Close button, Font button
OK button,
Cancel button, Make new file button
Help button, Close button, OK button
Help button, Close button, Restart button
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware and configuration information for your computer?
Student Answer: The System applet in Control Panel
Msinfo32
Msconfig.exe
Event Viewer
Instructor Explanation: TestOut PC Pro Section 9
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 4) Who is given credit for the GNU initiative?
Student Answer: Richard Stallman
Bill Gates
Linus Torvald
All of the above
Instructor Explanation: TestOut Linux+ Section 0.1.3
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 4) Which user type was available
in Windows XP but is not available
for Windows Vista and 7?
Student Answer: Guest
Administrator
Standard User
Power User
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) What Windows 7 feature speeds up file searches?
Student Answer: Shadow Copy
Indexing
Sharing
ReadyBoost
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 4) What is the default location for 64-bit application files in Windows 7?
Student Answer: The Windows folder
The Program Files folder
The SysWOW64 folder
The System64 folder
Instructor Explanation: Schmidt, Chapter 12
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Learning the next-generation features of the most recent smartphones is an example of _____.
Student Answer: OS maintenance
staying current with technology
leveraging documentation
working out a solution
Instructor Explanation: Schmidt, Chapter 11
Points Received: 4 of 4
Comments:
* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)
week 4
Devry CoMP129 Week 4 Quiz Latest 2015 October
1. Question : (TCO 5) A laptop normally has an _____ type of hard drive installed.
Student Answer: internal SCSI
external SCSI
external SATA
internal SATA
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 6) Why is backing up data to a different partition on the same hard drive not a good idea?
Student Answer: The data perform at a slower rate.
Other users who have rights to save files can retrieve the backup, install to a different computer or drive, and potentially see others’ data.
If the drive fails, both the data and the backup are potentially unusable.
The backup takes longer.
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 6) Which backup type would back up all the user’s data and set the archive bit for each file?
Student Answer: Comprehensive
Full
Differential
Incremental
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 5) Which optical medium has the greatest storage capacity?
Student Answer: Compact disc
Dual-layer, single-sided DVD
Single-layer, single-sided Blu-ray disc
Dual-layer, double-sided DVD
Instructor Explanation: TestOut PC Pro A+, Section 5.6
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 5) For internal optical drives, what is the most common type of internal interface found today?
Student Answer: SCSI
IDE
USB
Firewire
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 6) What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound?
Student Answer: Analog-to-digital conversion rate
Power rating
Frequency response
Signal to noise ratio
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 5) What Android app could be used to see saved photos?
Student Answer: Settings
Gallery
Photos
Video
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 5) What happens when you press the Fn key along
with a function key on a laptop computer?
Student Answer: You allow the computer
to be placed in one of four power modes, which helps with video troubleshooting.
You allow the computer
to be placed in diagnostic
mode, which is especially useful when troubleshooting video problems.
You get additional features depending
on the key you press.
You refresh the monitor.
Instructor Explanation: Schmidt, Chapter 9
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work area across two monitors.
What would be the best solution for this user?
Student Answer: Use an integrated VGA port and a DVI port on an adapter.
Install a video card with two ports if two ports are not available on the motherboard.
Use a KVM switch.
Use a video splitter.
Instructor Explanation: Schmidt, Chapter 9
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) What should you do when speaking on the phone with a customer who is very upset and yelling at you?
Student Answer: Stay calm but raise your voice level a little to show the importance and professionalism of your technical question.
Ask the caller whether you can put him or her on hold while he or she calms down.
Hang up on the caller.
Speak to the customer using a calm, professional tone.
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Devry CoMP129 Week 4 Quiz Latest 2015 October
1. Question : (TCO 5) A laptop normally has an _____ type of hard drive installed.
Student Answer: internal SCSI
external SCSI
external SATA
internal SATA
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 6) Why is backing up data to a different partition on the same hard drive not a good idea?
Student Answer: The data perform at a slower rate.
Other users who have rights to save files can retrieve the backup, install to a different computer or drive, and potentially see others’ data.
If the drive fails, both the data and the backup are potentially unusable.
The backup takes longer.
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 6) Which backup type would back up all the user’s data and set the archive bit for each file?
Student Answer: Comprehensive
Full
Differential
Incremental
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 5) Which optical medium has the greatest storage capacity?
Student Answer: Compact disc
Dual-layer, single-sided DVD
Single-layer, single-sided Blu-ray disc
Dual-layer, double-sided DVD
Instructor Explanation: TestOut PC Pro A+, Section 5.6
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 5) For internal optical drives, what is the most common type of internal interface found today?
Student Answer: SCSI
IDE
USB
Firewire
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 6. Question : (TCO 6) What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound?
Student Answer: Analog-to-digital conversion rate
Power rating
Frequency response
Signal to noise ratio
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 5) What Android app could be used to see saved photos?
Student Answer: Settings
Gallery
Photos
Video
Instructor Explanation: Schmidt, Chapter 8
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 5) What happens when you press the Fn key along
with a function key on a laptop computer?
Student Answer: You allow the computer
to be placed in one of four power modes, which helps with video troubleshooting.
You allow the computer
to be placed in diagnostic
mode, which is especially useful when troubleshooting video problems.
You get additional features depending
on the key you press.
You refresh the monitor.
Instructor Explanation: Schmidt, Chapter 9
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work area across two monitors.
What would be the best solution for this user?
Student Answer: Use an integrated VGA port and a DVI port on an adapter.
Install a video card with two ports if two ports are not available on the motherboard.
Use a KVM switch.
Use a video splitter.
Instructor Explanation: Schmidt, Chapter 9
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) What should you do when speaking on the phone with a customer who is very upset and yelling at you?
Student Answer: Stay calm but raise your voice level a little to show the importance and professionalism of your technical question.
Ask the caller whether you can put him or her on hold while he or she calms down.
Hang up on the caller.
Speak to the customer using a calm, professional tone.
Instructor Explanation: Schmidt, Chapter 7
Points Received: 4 of 4
Comments:
week 5
DevrDevry Comp129 Week 6 Quiz Latest 2015 October
1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4
DevrDevry Comp129 Week 6 Quiz Latest 2015 October
1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4
week 6
Devry Comp129 Week 6 Quiz Latest 2015 October
1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4
Comments:
Devry Comp129 Week 6 Quiz Latest 2015 October
1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.
Student Answer: Kerberos
Crypto IP Encapsulation (CIPE)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.
Student Answer: ExpressCard
CardBus card
PCI card
PC Card
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 3. Question : (TCO 8) A worm _____.
Student Answer: is a program that can replicate by attaching itself to another program
can spread copies of itself throughout a network without a host program
does not need a host program to work; It pretends to be a legitimate program
is dormant code added to software and triggered by a predetermined event
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.
Student Answer: Authentication
Authorization
A background process
BIOS settings
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.
Student Answer: Russian or Chinese hackers
college students studying hacking
employees leaving passwords in full view
disgruntled employees
Instructor Explanation: Week 6 Online Lecture
Points Received: 0 of 4
Comments:
Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
Student Answer: Buy 1/0 rewrite software.
Drill holes in the platters and smash the pieces with a hammer.
Hold a magnet over each platter.
Repartition the hard drive into multiple partitions using different file systems.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.
Student Answer: user service
encryption
authentication
authorization
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?
Student Answer: more
pwd
dir
ls
Instructor Explanation: TestOut Linux+, Section 1.1
Points Received: 4 of 4
Comments:
Question 9. Question : (TCO 9) What is SSID broadcasting?
Student Answer: The method the access point uses to reach all wireless NICs with a single message
A means for the access point to send the wireless encryption keys to all wireless NICs for network access
The access point constantly sending the name of the wireless network into the air
The access method used for 802.11 a, b, g, and n wireless networks
Instructor Explanation: Schmidt, Chapter 15
Points Received: 4 of 4
Comments:
Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.
Student Answer: never lying.
good communications skills
a new customer discount
professionalism.
Instructor Explanation: Schmidt, Chapter 15
Points Received: 0 of 4
Comments:
week 7
(TCO 4) You have been asked to temporarily fill in for a Linux administrator who has just been fired. This administrator was known to take a lax view of security and it is suspected that passwords are still kept in the /etc/passwd file. When viewing that file, which entry below would indicate that the passwords are there?
kolson:85yxir:430:0:Back Door:/root:/bin/bash
badams:x:341:52:Brent Adams:/users/badams:/bin/bash
dclifford:x:689:306:non secure user:/root:
tmurphy:x:100:100:/users/tmurphy:/bin/bash
Question 2. Question :
(TCO 11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When he inserts the disc and closes the drive tray, the drive turns, but he does not hear any music. What type of problem would a technician say this is?
The technician would say that it is a hardware problem.
The technician would say that it is a software problem.
The technician would say that it is an error of the user.
The technician would not be able to draw a conclusion from the description given.
Question 3. Question :
(TCO 10) In which troubleshooting step do you complete a help-desk ticket by typing the solution and closing the ticket?
Document findings, actions, and outcomes.
Identify the problem.
Verify full system functionality and, if applicable, implement preventive measures.
Establish a plan of action to resolve the problem and implement the solution.
Question 4. Question :
(TCO 10) The audio beeps heard during the boot process are caused by the _____.
RAM
processor
CMOS
BIOS
Question 5. Question :
(TCO 10) Hardware errors are often obvious _____.
during POST
during printing
when saving a file
during RAM access
Question 6. Question :
(TCO 10) What component is most likely to be included in an audio and video editing PC design?
RAID
Powerful GPU
Multiple processors
Video capture card
Question 7. Question :
(TCO 10) Which of the following would most likely be a design consideration for a gaming PC rather than a computer used for virtualization?
NAS
High amount of RAM
Multiple fast, large-capacity hard drives
Additional system cooling
Question 8. Question :
(TCO 10) Debbie keeps getting an error each time she tries to save her worksheet in AJAX ABC accounting software to the thumb drive. She then saves an Excel spreadsheet she was working on to the thumb drive and it too produces the error. A good next step would be to _____.
save the file to a different drive.
open the computer case to see whether the thumb drive is connected properly.
replace the hard drive.
Question 9. Question :
(TCO 10) Which statement is true regarding mobile design?
Smartphones typically have as much RAM as laptops.
Netbooks are low cost and lightweight.
Netbooks are typically lighter than tablets.
Laptops usually have less storage capability than tablets or smartphones.
Question 10. Question :
(TCO 10) An internal keyboard is generally connected to the laptop’s system board using a _____.
USB connector
ribbon cable
PS/2 port
mini-molex connector
kolson:85yxir:430:0:Back Door:/root:/bin/bash
badams:x:341:52:Brent Adams:/users/badams:/bin/bash
dclifford:x:689:306:non secure user:/root:
tmurphy:x:100:100:/users/tmurphy:/bin/bash
Question 2. Question :
(TCO 11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When he inserts the disc and closes the drive tray, the drive turns, but he does not hear any music. What type of problem would a technician say this is?
The technician would say that it is a hardware problem.
The technician would say that it is a software problem.
The technician would say that it is an error of the user.
The technician would not be able to draw a conclusion from the description given.
Question 3. Question :
(TCO 10) In which troubleshooting step do you complete a help-desk ticket by typing the solution and closing the ticket?
Document findings, actions, and outcomes.
Identify the problem.
Verify full system functionality and, if applicable, implement preventive measures.
Establish a plan of action to resolve the problem and implement the solution.
Question 4. Question :
(TCO 10) The audio beeps heard during the boot process are caused by the _____.
RAM
processor
CMOS
BIOS
Question 5. Question :
(TCO 10) Hardware errors are often obvious _____.
during POST
during printing
when saving a file
during RAM access
Question 6. Question :
(TCO 10) What component is most likely to be included in an audio and video editing PC design?
RAID
Powerful GPU
Multiple processors
Video capture card
Question 7. Question :
(TCO 10) Which of the following would most likely be a design consideration for a gaming PC rather than a computer used for virtualization?
NAS
High amount of RAM
Multiple fast, large-capacity hard drives
Additional system cooling
Question 8. Question :
(TCO 10) Debbie keeps getting an error each time she tries to save her worksheet in AJAX ABC accounting software to the thumb drive. She then saves an Excel spreadsheet she was working on to the thumb drive and it too produces the error. A good next step would be to _____.
save the file to a different drive.
open the computer case to see whether the thumb drive is connected properly.
replace the hard drive.
Question 9. Question :
(TCO 10) Which statement is true regarding mobile design?
Smartphones typically have as much RAM as laptops.
Netbooks are low cost and lightweight.
Netbooks are typically lighter than tablets.
Laptops usually have less storage capability than tablets or smartphones.
Question 10. Question :
(TCO 10) An internal keyboard is generally connected to the laptop’s system board using a _____.
USB connector
ribbon cable
PS/2 port
mini-molex connector
Course Project: Due in Week 7 (Begin in Week 1)
Objectives |Guidelines |Grading Rubrics |Best Practices |Week-by-Week Additions to the Project
Objectives
Back to Top
BUILDING A PERFECT PC!
The COMP129 project is designed to help you apply what you are learning each week using current hardware and software options to build a PC that meets a specific purpose. Although your Final Project is due in Week 7, you will begin working in Week 1 and continue adding components to your computer in each week of the class. Start by selecting the purpose of your computer and a budget. Then you can work each week to select components for your PC based on what you are learning in your class activities. Download the project deliverable template and create a spreadsheet in Week 1. (Remember, you will be turning in these two files in Week 7.) Build on these during the term as you work on building your perfect PC.
Guidelines
Back to Top
Plan to build your perfect PC. (Remember, you are to select each part of the computer. No kits are allowed. No prebuilt computing devices are allowed. This project is designed to help you apply what you are learning each week using current hardware and software options.) Use the lab project template to turn in your project questions. Attach an Excel spreadsheet that includes the major components, specifications, parts, vendors, pricing, and total cost as outlined below. (You can add additional rows and columns to the Excel template if you want to add more than the minimum in your completed computer build).
1. Plan the purpose of your computer. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.)
2. Preplan a price range and try to stick to it. (Were you able to stick to your budget? Why or why not?)
3. List all major components in your spreadsheet template. (Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed).
4. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.)
5. Include OS and software.
6. Update an Excel spreadsheet with all specifications and parts.
7. Price parts from two locations. You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such asnewegg.comorhttp://www.tigerdirect.com/. You can do all of your comparison shopping online, if you desire. (You will be adding in the prices from these two locations as separate columns in your spreadsheet. See Item 8 below.)
8. Update your spreadsheet with the seller’s name, prices, and totals. (Make sure you add the vendor, price, and total for all the items you select, as well as the total for the computer as a whole.)
9. Write a 4–5-paragraph report on your learning and experiences in completing this project. Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay.
Grading Rubrics
Back to Top
Category Points % Description
Completeness of specs and parts 10 28.5 All major components, OS, and software listed
Content, including brands, prices, and citation of source 15 43 All points addressed with adequate content
Quality and completeness of 2–5-paragraph report 10 28.5 Report will not address the steps taken to complete project, but will describe the learning taken away by completing the assignment
Total 35 100 A quality project will meet or exceed all of the above requirements.
Download the project template: Remember, you will have two files to submit in Week 7: the project template and your Excel spreadsheet.
Submit your assignment (two files) to the Week 7 Course Project Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructionsor watch this TutorialDropbox Tutorial.
See the Syllabus section “Due Dates for Assignments & Exams” for due date information.
Best Practices
Back to Top
Work each week: Although your Final Project is due in Week 7, start working in Week 1 and continue adding components to your computer in each week of the class. In Week 1, you will be selecting the purpose of your computer, as well as a budget. Find a purpose that will be interesting to you as you address the components each week throughout the course. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.) You will work each week to select components for your PC based on what you are learning in your class activities.
Budget: Were you able to stick to your original budget? Why or why not? Include this information on the project template.
Template: Use the project template to answer the questions and frame your project deliverables. Make sure you write in complete sentences and address all sections of the project. The component lists are the minimum—add in additional items as you find them each week. Different computer purposes and budgets will require different considerations for parts and budget. Make sure you add in everything necessary for your specific purpose. Did you have to modify your budget as you worked to select components each week?
Excel: Create an excel spreadsheet that includes all of the gradable items.
1. List all major components in your spreadsheet template. Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed.
2. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.)
3. Include OS and software.
4. Update an Excel spreadsheet with all specifications and parts.
5. Price parts from two locations: You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such asnewegg.comorhttp://www.tigerdirect.com/. You can do all of your comparison shopping online, if you desire.
6. Update your spreadsheet with the seller’s name, prices, and totals. Add the prices from the two vendor locations as separate columns in your spreadsheet. Make sure you add the vendor, price, and total for all items you select, as well as for the computer as a whole.
Essay: Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay. Talk about the purpose and budget issues, as well. How did you use your budget to select components? Were there any surprises? Were you able to stick to your original budget? Why or why not? Were there things you ended up not adding due to budget restrictions? These are only some things to consider as you assess your project work for the term.
Week-by-Week Additions to the Project
Back to Top
Week 1: This week is an introduction to hardware and software, and you will learn to identify basic computer components and the role of the operating system. Make sure you decide on a purpose for your project and an associated budget. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.)
Week 2: This week is an introduction to motherboards, CPUs, memory, and BIOS/CMOS. Apply what you are learning this week to your Course Project by investigating which motherboard, CPU, and memory selection is appropriate for your computer build.
Week 3: This week is an introduction to the basic function of the operating system the most common types of operating systems available. Apply what you are learning this week to your Course Project by investigating which OS is appropriate for your computer and what version to install.
Week 4: This week is an introduction to how a hard drive works and what forms of peripherals, backup, and storage devices are available. Apply what you are learning this week to your Course Project by investigating what hard drive, peripherals, and storage media you want to include with your system.
Week 5: This week is an introduction to networking and networking components. Apply what you are learning this week to your Course Project by investigating what NIC to include with your system.
Week 6: This week introduces topics related to security. Apply what you are learning this week to your Course Project by investigating what OS to include with your system. In addition, decide how to handle physical security issues for your computer, as well as what you will use to help fight malware and viruses. Are you going to choose a firewall? Why or why not?
Week 7: The Course Project is due this week and
Objectives |Guidelines |Grading Rubrics |Best Practices |Week-by-Week Additions to the Project
Objectives
Back to Top
BUILDING A PERFECT PC!
The COMP129 project is designed to help you apply what you are learning each week using current hardware and software options to build a PC that meets a specific purpose. Although your Final Project is due in Week 7, you will begin working in Week 1 and continue adding components to your computer in each week of the class. Start by selecting the purpose of your computer and a budget. Then you can work each week to select components for your PC based on what you are learning in your class activities. Download the project deliverable template and create a spreadsheet in Week 1. (Remember, you will be turning in these two files in Week 7.) Build on these during the term as you work on building your perfect PC.
Guidelines
Back to Top
Plan to build your perfect PC. (Remember, you are to select each part of the computer. No kits are allowed. No prebuilt computing devices are allowed. This project is designed to help you apply what you are learning each week using current hardware and software options.) Use the lab project template to turn in your project questions. Attach an Excel spreadsheet that includes the major components, specifications, parts, vendors, pricing, and total cost as outlined below. (You can add additional rows and columns to the Excel template if you want to add more than the minimum in your completed computer build).
1. Plan the purpose of your computer. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.)
2. Preplan a price range and try to stick to it. (Were you able to stick to your budget? Why or why not?)
3. List all major components in your spreadsheet template. (Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed).
4. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.)
5. Include OS and software.
6. Update an Excel spreadsheet with all specifications and parts.
7. Price parts from two locations. You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such asnewegg.comorhttp://www.tigerdirect.com/. You can do all of your comparison shopping online, if you desire. (You will be adding in the prices from these two locations as separate columns in your spreadsheet. See Item 8 below.)
8. Update your spreadsheet with the seller’s name, prices, and totals. (Make sure you add the vendor, price, and total for all the items you select, as well as the total for the computer as a whole.)
9. Write a 4–5-paragraph report on your learning and experiences in completing this project. Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay.
Grading Rubrics
Back to Top
Category Points % Description
Completeness of specs and parts 10 28.5 All major components, OS, and software listed
Content, including brands, prices, and citation of source 15 43 All points addressed with adequate content
Quality and completeness of 2–5-paragraph report 10 28.5 Report will not address the steps taken to complete project, but will describe the learning taken away by completing the assignment
Total 35 100 A quality project will meet or exceed all of the above requirements.
Download the project template: Remember, you will have two files to submit in Week 7: the project template and your Excel spreadsheet.
Submit your assignment (two files) to the Week 7 Course Project Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructionsor watch this TutorialDropbox Tutorial.
See the Syllabus section “Due Dates for Assignments & Exams” for due date information.
Best Practices
Back to Top
Work each week: Although your Final Project is due in Week 7, start working in Week 1 and continue adding components to your computer in each week of the class. In Week 1, you will be selecting the purpose of your computer, as well as a budget. Find a purpose that will be interesting to you as you address the components each week throughout the course. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.) You will work each week to select components for your PC based on what you are learning in your class activities.
Budget: Were you able to stick to your original budget? Why or why not? Include this information on the project template.
Template: Use the project template to answer the questions and frame your project deliverables. Make sure you write in complete sentences and address all sections of the project. The component lists are the minimum—add in additional items as you find them each week. Different computer purposes and budgets will require different considerations for parts and budget. Make sure you add in everything necessary for your specific purpose. Did you have to modify your budget as you worked to select components each week?
Excel: Create an excel spreadsheet that includes all of the gradable items.
1. List all major components in your spreadsheet template. Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed.
2. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.)
3. Include OS and software.
4. Update an Excel spreadsheet with all specifications and parts.
5. Price parts from two locations: You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such asnewegg.comorhttp://www.tigerdirect.com/. You can do all of your comparison shopping online, if you desire.
6. Update your spreadsheet with the seller’s name, prices, and totals. Add the prices from the two vendor locations as separate columns in your spreadsheet. Make sure you add the vendor, price, and total for all items you select, as well as for the computer as a whole.
Essay: Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay. Talk about the purpose and budget issues, as well. How did you use your budget to select components? Were there any surprises? Were you able to stick to your original budget? Why or why not? Were there things you ended up not adding due to budget restrictions? These are only some things to consider as you assess your project work for the term.
Week-by-Week Additions to the Project
Back to Top
Week 1: This week is an introduction to hardware and software, and you will learn to identify basic computer components and the role of the operating system. Make sure you decide on a purpose for your project and an associated budget. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.)
Week 2: This week is an introduction to motherboards, CPUs, memory, and BIOS/CMOS. Apply what you are learning this week to your Course Project by investigating which motherboard, CPU, and memory selection is appropriate for your computer build.
Week 3: This week is an introduction to the basic function of the operating system the most common types of operating systems available. Apply what you are learning this week to your Course Project by investigating which OS is appropriate for your computer and what version to install.
Week 4: This week is an introduction to how a hard drive works and what forms of peripherals, backup, and storage devices are available. Apply what you are learning this week to your Course Project by investigating what hard drive, peripherals, and storage media you want to include with your system.
Week 5: This week is an introduction to networking and networking components. Apply what you are learning this week to your Course Project by investigating what NIC to include with your system.
Week 6: This week introduces topics related to security. Apply what you are learning this week to your Course Project by investigating what OS to include with your system. In addition, decide how to handle physical security issues for your computer, as well as what you will use to help fight malware and viruses. Are you going to choose a firewall? Why or why not?
Week 7: The Course Project is due this week and
No comments:
Post a Comment