chitika2

الأحد، 27 أكتوبر 2013

Truck containing 22,500 LG G2 phones goes missing



 
Talk about your hot phone.
A truck containing 22,500 LG G2 smartphones was stolen on the way to its destination in Louisville, Ky., CNET has learned. The phones were on their way to Sprint, which is expected to launch its version of the G2 early next month.

The phones were stolen at 6:30 p.m. Thursday at a truck stop in Gary, Ind., an LG representative confirmed to CNET. The driver left the truck for a bathroom break, and upon returning, found the vehicle missing.
The Indiana and Illinois state police have been contacted, as well as the FBI.
The G2 is LG's flagship device, and has stood out in the market with its unique volume and power button located at the back of the smartphone, right under the camera. It's a controversial change that has met with mixed reviews.
The G2, like other flagship phones such as the Galaxy S4, iPhone 5S, and HTC One, was released on multiple carriers, with Sprint among the later carriers to sell the device.

الجمعة، 25 أكتوبر 2013

Cisco Discovery 1: DHomesb Chapter 1 toets antwoorden / DHomesb exam 1 answers



DHomesb Chapter 1 Exam Answers
1. Which computer component is considered the nerve center of the computer system and is responsible for processing all of the data within the machine?
RAM
* CPU
video card
sound card
operating system

2. What are two advantages of purchasing a preassembled computer? (Choose two..
* usually a lower cost
exact components may be specified
extended waiting period for assembly
* adequate for performing most general applications
suited for customers with special needs

3. A user plans to run multiple applications simultaneously on a computer. Which computer component is essential to accomplish this?
* RAM
NIC
video card
sound card
storage device

4. Which adapter card enables a computer system to exchange information with other systems on a local network?
modem card
controller card
video card
sound card
* network interface card

5. What is the main storage drive used by servers, desktops, and laptops?
tape drive
* hard drive
optical drive (DVD)
floppy disk drive

6. Which component is designed to remove high-voltage spikes and surges from a power line so that they do not damage a computer system?
CPU
* surge suppressor
motherboard
hard drive

7. What are two examples of output peripheral devices? (Choose two.)
* printer
* speakers
flash drive
external DVD
external modem

8. What two functions does a UPS provide that a surge protector does not ? (Choose two.)
protects the computer from voltage surges
* provides backup power from an internal battery
protects the computer from sudden voltage spikes
gives the user time to phone the electrical company
* gives the user time to safely shut down the computer if the power fails
provides backup power through a generator provided by the wall outlet

9. What is a word processor?
It is a physical computer component.
* It is a program designed to perform a specific function.
It is a program that controls the computer resources.
It is a functional part of an operating system.

10. What is the purpose of the ASCII code?
translates bits into bytes
interprets graphics digitally
translates digital computer language into binary language
* represents letters, characters, and numbers with bits

11. Why do servers often contain duplicate or redundant parts?
Servers require more power and thus require more components.
* Servers should be accessible at all times.
Servers can be designed as standalone towers or rack mounted.
Servers are required by networking standards to have duplicate parts.

12. What are two benefits of hooking up a laptop to a docking station? (Choose two.)
Mobility is increased.
* An external monitor can be used.
* Alternate connectivity options may be available.
The keyboard can be changed to a QWERTY-style keyboard.
More wireless security options are available.

13. Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
* CAD
presentation
spreadsheet
word processing
* medical practice management
contacts/scheduling management

14. Which three terms describe different types of computers? (Choose three.)
operating system
network
* laptop
* desktop
Windows
* mainframe

15. How is a server different from a workstation computer?
The server works as a standalone computer.
* The server provides services to clients.
The workstation has fewer applications installed.
The workstation has more users who attach to it.

16. How many values are possible using a single binary digit?
1
* 2
4
8
9
16

17. What measurement is commonly associated with computer processing speed?
bits
pixels
* hertz
bytes


18. What can be used to prevent electrostatic discharge (ESD)?
dry and non humid conditions
carpeted floor
* grounding strap
uncluttered work space

19. If a peripheral device is not functioning, what are three things you should do to solve the problem? (Choose three.)
* Use the testing functionality on the peripheral itself, if available.
* Verify that all cables are connected properly.
Disconnect all cables connected to the computer except those connected to the peripheral.
* Ensure that the peripheral is powered on.
Disconnect the peripheral and verify that the computer is operating normally.
Reload the computer operating system.

20. Which two steps should be performed when installing a peripheral device? (Choose two.)
* Download and install the most current driver.
Connect the peripheral using any cable and any available port on the computer.
* Connect the peripheral using an appropriate cable or wireless connection.
Test the peripheral on another machine before installing it on the one where it will be used.
Check the computer documentation to see if the peripheral vendor is compatible with the PC vendor.

21. In newer operating systems, how are system resources assigned by default when components are installed?
manually assigned by the operating system
manually assigned by the administrator
statically assigned by the component to a preset resource
* dynamically assigned between the component and the operating system