Saturday, November 26, 2011

(Ending Soon!!) Get $10 Amazon Giftcards for Referring Friends to StumbleUpon

I love getting free gift cards!! And here is a pretty easy way you can get free $10 Amazon cards to spend on what ever you want!!
Through Nov 27th you can invite 5 friends to join StumbleUpon and get a free $10 Amazon gift card.
Here’s the scoop:
1. Make sure you are signed up for StumbleUpon- go here to do so
2. When a friend you invited signs up you will receive an email confirmation letting you know. If 5 sign up you will get your free giftcard!!
Referrer shall receive one Reward valued at $10 in for each five Qualified Referrals generated by Referrer. For every 5 referrals who register for the StumbleUpon Share Program, you will receive one $10.00 Amazon gift card. Sorry, no partial credit. You will only receive a gift card for every 5 Qualified Referrals. Delivery of gift card will be made within 6 weeks. Self-referrals not allowed. Gift Cards subject to terms of card. Gift cards may be delivered digitally to recipient. StumbleUpon is not responsible for gift cards delivered to spam folders and will resend original link, but not replace link.

Friday, September 23, 2011

Windows 8 with Product Key for Free

 Windows 8 with Product Key  for Free

Windows 8 with developer tools English, 64-bit (x64) [Size - 4.8 GB]
 
 Sha 1 hash - 6FE9352FB59F6D0789AF35D1001BD4E4E81E42AF

All of the following come on a disk image file (.iso). See below for installation instructions.

  1. 64-bit Windows Developer Preview
  2. Windows SDK for Metro style apps
  3. Microsoft Visual Studio 11 Express for Windows Developer Preview
  4. Microsoft Expression Blend 5 Developer Preview
  5. 28 Metro style apps including the BUILD Conference app
download

2. Windows 8 English, 64-bit (x64) [Size - 3.6 GB]

     Sha 1 hash – 79DBF235FD49F5C1C8F8C04E24BDE6E1D04DA1E9

Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 64-bit PC.

Download


3. Windows 8 English, 32-bit (x86) [Size - 2.8 GB]

     Sha 1 hash - 4E0698BBABE01ED27582C9FC16AD21C4422913CC

Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 32-bit PC.

System Requirements :
Windows Developer Preview works great on the same hardware that powers Windows Vista and Windows 7:

  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver
  • Taking advantage of touch input requires a screen that supports multi-touch
  • To run Metro style Apps, you need a screen resolution of 1024 X 768 or greater
Download


 Windows 8 Product Key

Windows 8 Product Key : 6RH4V-HNTWC-JQKG8-RFR3R-36498
server version of Windows Developer can use this product key: 4Y8N3-H7MMW-C76VJ-YD3XV-MBDKV

Saturday, September 10, 2011

Free Facebook credits/ facebook credit generator

Free Facebook credits/ facebook credit generator

f you may notice, FB Credit is a kind of currency shopping system to purchase virtual items regarding Facebook Video games as well as applications. you can also useFB credits to send virtual gifts  to friends and family. you can buy FB credits with credits cards, paypal, phone and using cards from FB stores as well, so we thought, instead of making.
bots to every single game, FB credit generator or FB credit adder for free to add free facebook credits and solve the whole problem

we give Link will  Soon !!!!!!!!!!!!!!!!!!

Thursday, September 8, 2011

How to listen to most songs do not sync with iTunes

That people with any rate would hardly have songs in your library, or do not like music, you can skip songs come when I do not feel that I have. Such, but most do not wish to listen to music synchronized to the iPod can be configured to ignore it in iTunes.



This is Internet radio "Pandora" for "hearing a month (don't play for a month)" function is very similar.

Basically, the song skips several times over, it is determined that the tracks do not like iTunes, smart playlists us off from a specific month. When you are creating a Smart Playlist from the drop-down menu "skipped the last day," choose a certain time period (one month for example) is OK if you specify. This makes it ignore the playlist a song that was skipped in the past month.

Also like the above image, the number of skips "less than three times" and if you add another filter, skip one or two songs will be synced to your playlist. This song has been deemed not live in the songs just do not like skipping just one.

To rate a song with all the more so that the work put into playlists, less than one star, I think in a much more comfortable this way. And if the iPod's capacity is low, very useful to filter a song about hearing. Please try us.

Seven tips to perpetuate long distance relationship work

Hello
Of a long-distance love is, but it is not hard 会Enai time. I think many of you who would split the stress and loneliness? So, I will introduce a little trick to successful long-distance love, please try to help.
Photo by thezartorialist.com.

Daily e-mail contact only
I may be short sentences, send e-mail every day. And given a sense of security, and do not do this, and many people feel that dating does not make sense. Plan accordingly.
Short call
Just because 会Enai, not very long phone call to a taboo.高Bura feeling rather let meet informal Noh play, it is very stressful for 会Enai. Once even a fight with a long phone call to the poor, very disappointing. The ending is recommended to call in about 10 minutes.
Also contacted the other parents, etc.
If you know the address and telephone number and, occasionally, etc. Take a contact person's parents. By doing so, the lead was 1:1, and it increases to 3 pair 2,1, the statement is against the peace of mind.
Then keep an appointment
Spend time together is limited so that, when there come up with a plan to meet next. The next thing you are going to meet, so you can hang in there to enjoy it also is effective.
Write a letter
Apart from the e-mail, letter writing is quite recommended. Email remains the shape than I, even apart from have a sense of intimacy. Once you have enclosed photographs and will have them looking forward to coming every letter.
Playing with friends of the opposite sex
会Enai period to remain still, is painful in its own way. Boyfriend once in a while, playing with the opposite sex other than her, you might like that distract the mind. Try to order too much stress.
Convey the feelings of each other meet
Go to the other's feelings and cold feelings 会Enai minutes, meet regularly communicate feelings. Be able to reassure the person you reaffirm a sense to say that the feelings of each other.
Long-distance love are dying too are in touch just because 会Enai not lasting too long phone call every day to keep in touch with such opposition. "Moderately" because the point is that, please come out and helpful.

Sunday, July 24, 2011

writeCover letter for ODesk


Dear Sir Hire name ,

Good Day
I’m interested in the position of  "job Title  " you  recently posted. I have been a working as (your position ) for (no of year) years, and am very familiar with PHP, JAVA, Wordpress and joomla. During my "no of year" years as "position" in "your company ", I managed a couple of websites . You can see some of my own writing in my portfolio

http://example.com

“You had mentioned that you were looking for someone with a background in "background of job". I studied it in college, where I majored in Computer Science .

“Moving forward, I can dedicate "no of availabe hour" hours/week to your company, and my daily hours are negotiable. I’m very excited to assist you in making your Sites successful – please feel free to contact me directly to discuss this position further.”

my skype id :  "Your skype Id here"

Regards,
"Your Name"

Saturday, July 23, 2011

Cisco Discovery Exam - V.4 in english

1.Which protocol is used to transfer files among network devices and perform file-management functions?
FTP
2.What is the function of the DNS server?
It maps a hostname to a corresponding IP address
3.A computer joins the network and announces itself to all hosts on the LAN. What type of message does the computer send out?
broadcast
4.As an assignment, a computer science student needs to present data in binary format. What are the two possible values that the student can use? (Choose two.)
0 and 1

Cisco Discovery Exam - V.4 in english

1.Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
POP3
2.A user tries to open a page on the web server at www.cisco.com. The user’s workstation does not have the destination IP address in order to encapsulate the request. Which network topology will provide the services that are required to associate the name of the web server with an IP address?
host1 –> SW1 –giu DNS Server –> R1 –> Web Server
3.TCP/IP data transmission between the source and destination host is de-encapsulated in four steps:
B, D, C, A

Final Exam – CCNA Discovery: Networking for Home and Small Businesses (Version 4.0) FIX

Savage Worlds Dime Novel #1 Beast Of Fire

Savage Worlds Dime Novel #1 Beast Of Fire

 

Download

Lykke Li Youth Novel (2008)

Lykke Li Youth Novel (2008)

 

Download

Law of the Rope The Book of Three (2008)

Law of the Rope The Book of Three (2008)

 

mediafire

Super Motocross game

You're the driver of the coolest motorcycles. Dirt roads and wind are your domain! Pass all the tests in tropical jungles, to become a real freestyle motocross champion! The twisting roads, mind-blowing jumps and obstacles already await you now. You can get through it all, because you have a racing motorcycle. Front flips, back flips and different tricks will bring you additional shots of nitro. Be fast and use the speed to win the competitions and get your trophies. They will let you move on to the next level. You will have to use your wit to pass through each successive obstacle. Collect the needed number of prizes, in order to gain access to new motorcycles and become even cooler. The interesting and unpredictable game "Super Motocross" is for lovers of extreme sports. Download and play it absolutely free of charge. Become a real motocross star!

Features:

  • 4 cool motorcycles
  • 15 levels
  • 3D graphics
  • Arcade feel

System requirements:

  • Windows 2000/XP/Vista
  • Processor 1 Ghz or better
  • 256 Mb RAM
  • 64 Mb of video memory
Download

Artichoke and Sun Dried Tomato White Pizza Recipe

Ingredients
1 pizza crust mix or recipe made per
directions
1/2 cup sun dried tomatoes, finely diced
2 large cloves of garlic
1/4 cup olive oil
1 12-ounce can artichoke hearts (not
marinated)
1 1/3 cup mozzarella cheese
1/4 cup gorgonzola cheese
Italian spices as desired
Directions
Preheat the oven to 450 degrees.
1. Form the pizza dough into a pizza crust. Let it rest for ten minutes.
2. Steep the sun dried tomatoes for ten minutes in hot water. Drain the water and
pat dry with a paper towel.
3. Mince the garlic and mix it with two tablespoons of the olive oil. Spread the
mixture over the crust.
4. Drain the artichoke hearts, chop them if needed, and spread them over the crust.
Spread the sun dried tomatoes. Sprinkle the cheeses evenly over the vegetables.
Add pizza spice if desired. Drizzle the remaining olive oil over the toppings.
5. Bake for 20 minutes or until the crust is baked and the cheeses are bubbly.

Wednesday, July 20, 2011

New York White Pizza Recipe

Ingredients
1 pizza crust mix or recipe made per directions
1 large clove of garlic
1/4 cup olive oil
1 1/2 cup mozzarella cheese
1/4 cup parmesan cheese
1/4 cup Romano cheese
Italian spices as desired
Directions
Preheat the oven to 450 degrees.
1. Form the pizza dough into a pizza crust. Let
it rest for ten minutes.
2. Mince the garlic and mix it with two
tablespoons of the olive oil. Spread the
mixture over the crust.
3. Sprinkle the cheeses evenly over the crust. Add the Italian spice. Drizzle the
remaining olive oil over the toppings.
4. Bake for 20 minutes or until the crust is baked and the cheeses are bubbly.

Monday, July 18, 2011

Fibonacci Forex Trading

Fibs and especially Fibonacci profit targets are very useful for scalping as they make good areas to use to estimate risk vs reward ratios. NEVER take trades with less than a 1.5x bigger potential profit than what you risk. If likely target is 10 pips and you are risking 10+ pips don't take trade. Only draw fibs on 25-35+ pip moves, under this they are completely WORTHLESS. The bigger the swing the higher % of the time they work and often to within 2-3 pips.

Fibonacci Forex Trading

Mother by Maxim Gorky

Mother by Maxim Gorky

 

Download

Little House Books

This series is very popular all over the world . So find the following link to download the series from 1-9

Download

Sunday, July 10, 2011

Facebook Song

Facebook Song 

 

A List of Download Souces for Free E-books

 O'Reilly online
 http://www.oreilly.com/openbook/
 http://sysadmin.oreilly.com/ 

 Computer books and manuals
 http://www.hoganbooks.com/freebook/webbooks.html
 http://www.informit.com/itlibrary/
 http://www.fore.com/support/manuals/home/home.htm http://www.adobe.com/products/acrobat/webbuy/freebooks.html 

 The Network Book
 http://www.cs.columbia.edu/netbook/ 

 Some #bookwarez.efnet.irc links 
 http://www.extrema.net/books/links.shtml 

 Some #bookwarez.efnet.irc fiction
 http://194.58.154.90:4431/enscifi/ 

 Pimpas online books (Indonesia)
 http://202.159.16.55/~pimpa2000
 http://202.159.15.46/~om-pimpa/buku 

 Security, privacy and cryptography
 http://theory.lcs.mit.edu/~rivest/crypto-security.html
 http://www.oberlin.edu/~brchkind/cyphernomicon/
 My own misc online reading material
 http://www.eastcoastfx.com/docs/admin-guides/
 http://www.eastcoastfx.com/~jorn/reading/
 Computer books
 http://solaris.inorg.chem.msu.ru/cs-books/
http://sweetrude.net/~cab/books/
 http://alaska.mine.nu/books/
 http://poprocks.dyn.ns.ca/dave/books/
 http://58-160.skarland.uaf.edu/books/
 http://202.186.247.194/~ebook/
 http://hooligans.org/reference/
 Linux documentation
 http://www.linuxdoc.org/docs.html
 FreeBSD documentation
 http://www.freebsd.org/tutorials/
 Sun documentation
 http://osiris.imw.tu-clausthal.de:8888/
 http://uran.vvsu.ru:8888/
 SGI documentation
 http://newton.unicc.chalmers.se/ebt-bin/nph-dweb/dynaweb;td=2
 http://techpubs.sgi.com/library/tpl/cgi-bin/init.cgi
 IBM Online Redbooks
 http://www.redbooks.ibm.com/
 Digital UNIX documentation http://www.unix.digital.com/faqs/publications/base_doc/DOCUMENTATION/V40D_HTML/V40D_HTML/LIBRARY.HTM
File system Hierarchy Standard
 http://www.pathname.com/fhs/2.0/fhs-toc.html
 http://www.linuxbase.com/
 UNIX stuff
 http://www.ucs.ed.ac.uk/~unixhelp/index.html
 http://www.uwsg.indiana.edu/usail/ http://www.isu.edu/departments/comcom/unix/workshop/unixindex.html http://www.franken.de/users/lorien/unix.html
 http://www.cs.buffalo.edu/~milun/unix.programming.html
Programmers reading
 http://www.programmersheaven.com/ 
 http://www.cs.monash.edu.au/~alanf/se_proj97/
Programming Pearls 2nd edition
 http://www.cs.bell-labs.com/cm/cs/pearls/
 C stuff
 http://www.strath.ac.uk/CC/Courses/NewCcourse/ccourse.html
 http://www.cm.cf.ac.uk/Dave/C/CE.html
 http://www.cprogramming.com/tutorial.html
 http://www.cs.virginia.edu/c++programdesign/slides/  http://www.icce.rug.nl/docs/cplusplus/cplusplus.html
 Perl stuff
 http://www.webdesigns1.com/perl/ir.html
 http://www.ictp.trieste.it/texi/perl/perl_toc.html
 http://www.itknowledge.com/tpj/
 http://www.plover.com/~mjd/perl/
 Java stuff
 http://www.cs.brown.edu/courses/cs016/book/  http://polaris.cis.ksu.edu/~schmidt/CIS200/  http://www.daimi.au.dk/dProg1/java/langspec-1.0/index.html
 Lisp stuff
 http://www.cs.cmu.edu/afs/cs.cmu.edu/project/ai-repository/ai/html/cltl/mirrors.html
 http://www.cs.tulane.edu/www/Villamil/lisp/
 Ada stuff
 http://www.adahome.com/Tutorials/
 Database reading
 http://www.bus.orst.edu/faculty/brownc/lectures/db_tutor/index.htm
 SQL stuff
 http://w3.one.net/~jhoffman/sqltut.htm  http://www.doc.mmu.ac.uk/STAFF/E.Ferneley/SQL/index.htm  http://www.daimi.au.dk/~oracle/sql/index.html
 Visual Basic stuff
 http://www.vb-world.net/books/
 Handbook of Applied Cryptography
 http://www.cacr.math.uwaterloo.ca/hac/
 X Window System
 http://tronche.com/gui/x/
 http://www.cen.com/mw3/refs.html
 http://www.gaijin.com/X/
 GTK and Gnome stuff
 http://developer.gnome.org/doc/GGAD/ggad.html
 QT and KDE stuff
 http://www.troll.no/qt/
 http://developer.kde.org/documentation/tutorials/index.html  http://www.arrakis.es/~rlarrosa/tutorial.html
 Corba stuff
 http://www.iona.com/hyplan/vinoski/
 TCP/IP info
 http://www.tunix.kun.nl/ptr/tcpip.html
 Misc programmers reading
 http://www.cs.wisc.edu/~chilimbi/Pubs.html  http://www.ic.arizona.edu/~nromano/spring99/readings.htm
 Some useful tech articles
 http://www.sysadminmag.com/
 http://www.dotcomma.org/
Considering Hacking Constructive
 http://www.firstmonday.dk/issues/issue4_2/gisle/index.html
 Eric's Random Writings
 http://www.tuxedo.org/~esr/writings/
 IBM's History
 http://www.ibm.com/ibm/history/story/text.html
Electronic Publishing
 http://www.civeng.carleton.ca/~nholtz/ElectronicPublishing.html
 Digital processing
 http://www.dspguide.com/pdfbook.htm
 The Hardware Book
 http://sunsite.auc.dk/hwb/
 Network iQ Router Reference Manual
 http://www.teltrend.co.nz/documentation/networkiq/rel74/html/rmtoc.htm
 Cisco Product Documentation
 http://www.cisco.com/univercd/cc/td/doc/product/
 Novell developers’ appnotes
 http://developer.novell.com/research/appnotes/
 Icons for your desktop
 http://nether.tky.hut.fi/iconstore/
 Hackers' Hall of Fame at Discovery Online
 http://www.discovery.com/area/technology/hackers/hackers.html
 Symbols and signs and ideograms and stuff
 http://www.symbols.com/ Dictionaries http://www.ohiolink.edu/db/oed.html
 http://www.ohiolink.edu/db/ahd.html
 http://www.ohiolink.edu/db/columbia.html http://www.ohiolink.edu/db/thes.html http://www.eb.com:180/
 Misc reading material
 http://dali.orgland.ru/tcd/
 http://www.ud.se/english/press/pdf_publ.htm
 Dante’s Inferno
 http://sophia.smith.edu/~lkleinbe/dante/home.html
 http://www.divinecomedy.org/
 Books and texts
 http://digital.library.upenn.edu/books/
 http://www.cs.cmu.edu/books.html
 http://www.ipl.org/reading/books/
 http://www.nakedword.org/
 http://sunsite.berkeley.edu/alex/
Literature stuff
 http://lion.chadwyck.co.uk:8080/ 
 http://www.swan.ac.uk/uwp/lit.htm
 Octavo books
 http://www.octavo.com/
 Project Gutenberg - books and texts
 http://www.promo.net/pg/
 Project Runeberg - Scandinavian in books and texts http://www.lysator.liu.se/runeberg/katalog.html
 The Elements of Style
 http://www.bartleby.com/141/index.html
 Bigtext - illustrated books and manuals for DOS http://www.ozemail.com.au/~kevsol/oldfav.html#bigtext
 Breeze - a complete text system for Windows
 http://www.ozemail.com.au/~kevsol/sware.html#brzwin
 Language links
 http://www.june29.com/HLP/
 Grimm’s' fairy tales
 http://www.nationalgeographic.com/grimm/archive.html
 Winnie the Pooh
 http://www.machaon.ru/pooh/
 Seven Wonders of the World
 http://ce.eng.usf.edu/pharos/wonders/
 Medieval history
 http://www.fordham.edu/halsall/sbook2.html
 Misc history
 http://www.usaor.net/users/ipm/contents.html
 http://www.homeusers.prestel.co.uk/littleton/re0_cath.htm
Stonehenge’s Legends
 http://www.missgien.net/stonehenge/legends.html
 In Parentheses historical papers
 http://www.inpar.dhs.org/
 Bulfinchs Mythology
 http://www.bulfinch.org/
 The Dead Sea Scrolls
 http://lcweb.loc.gov/exhibits/scrolls/toc.html
 Qumran historical site
 http://www.kalia.org.il/Qumran/
 Index of cults
 http://www.totentanz.de/kmedeke/cults.htm
 Heretical speculation
 http://www.calweb.com/~queribus/gnosticgnus.html
 The esoteric Ordo Supremus Militaris Templi Hierosolymitani http://www.osmth.org/index.html
 Runes and Norse stuff
 http://www.multiart.nu/grimner/
 http://www.eastcoastfx.com/~jorn/runes/
Extinction level events
 http://members.xoom.com/korwisi/ele/english/index.html
 http://impact.arc.nasa.gov/
 http://www.boulder.swri.edu/clark/ncar.html
 Stephen Hawkings Universe
 http://www.pbs.org/wnet/hawking/html/home.html
 The constellations
 http://www.dibonsmith.com/constel.htm
 Falling into a black hole
 http://casasrv.colorado.edu/~ajsh/schw.shtml
 Gravity is a push
 http://www.epicom.com/gravitypush/
 Online audio books
 http://www.broadcast.com/books/scifi/
 ElecBooks
 http://www.elecbook.com/eblist.htm
 NewMedia Classics
 http://www.newmediaclassics.com/
 Online Books Archive
 http://docs.online.bg/
 Internet Public Library
 http://www.ipl.org/
 Rocket-Library.com
 http://www.rocket-library.com/categories.asp
 PalmPilot E-Text Ring
 http://www.webring.org/cgi-bin/webring?ring=pilot_text&id=2&List
 Virtual Free Books
 http://www.virtualfreesites.com/free.books.am.html
 All About Ebooks
 http://aalbc.com/ebooks/Allaboutebooks.htm

Veggie and Sausage Supreme Pizza Recipes

Pizza is everyone’s favorite. With all
these fresh veggies, why not serve them
up on pizza? This one is main stream
enough that even the kids will go for it. Of
course, you can change the toppings to
suit your fancy.
I started making this pizza when we lived
in Minnesota and the kids were young. At
that time, we had a favorite national chain
that we attended regularly. The kids
declared this pizza better than the
restaurants’. That’s pretty good
considering the number of veggies that I
would usually sneak under all that cheese.
Ingredients
For the crust
1 seven gram package instant yeast
2 3/4 cups all-purpose or bread flour
1 cup water at 105 degrees
1 teaspoon salt
1 teaspoon sugar
3 tablespoons olive oil
For the filling
1/2 pound mild Italian sausage
about 1 1/2 cups pizza or spaghetti sauce
1 teaspoon dry crushed oregano (optional)
1 tablespoon dry crushed basil leaves (optional)
2 cups shredded mozzarella
about 1 cup sliced fresh mushrooms
about 1/4 cup diced onion
1/2 bell pepper diced
1/2 cup olives, sliced
1 cup shredded mozzarella, fontina, or gorgonzola cheese
1/4 cup shredded parmesan cheese
Directions
For the crust
Prepare a 15-inch pizza pan or a 8 1/2 x 13-inch baking pan by greasing generously with
olive oil and sprinkling with corn meal or semolina flour.
1. Place half the flour and yeast in the bowl of your stand-type mixer. Add the warm
water and beat with a dough hook until it is partially mixed—about 30 seconds.
The purpose of this mixing is to hydrate the yeast.
2. Add the rest of the flour to the bowl. Add the salt, sugar, and olive oil. Knead with
the dough hook at medium speed for four minutes adding more flour to reach a
soft but not sticky dough. Press the dough into the pizza pan or the baking pan
and cover and let stand in a warm place for about 30 minutes or until it is puffy.
Complete with the filling as directed.
For the filling
Preheat the oven to 400 degrees.
1. Cook the Italian sausage, drain the grease from the cooked sausage, and pat it
free of grease. Set it aside.
2. Spread the pizza sauce on the pizza dough. Sprinkle it with the optional oregano
and basil and then the 2 cups mozzarella. Spread the cooked sausage over the
cheese.
3. Spread the mushrooms, onions, bell peppers, and olives over the mozzarella.
Sprinkle the 1/2 teaspoon of oregano and 1 teaspoon basil over the vegetables.
4. Spread the remaining cheese over the vegetables.
5. Bake for 20 to 25 minutes or until the crust is brown and the cheeses are bubbly.
Serve hot.
Makes one 15 inch pizza.

Thursday, May 26, 2011

Sony Ericsson Xperia Mini



Available:
Q3 2011
Network:
GSM 850 / 900 / 1800 / 1900 +
UMTS 900 / 2100 or 800 /1900 / 2100
Data:
GPRS + EDGE + UMTS (3G) + HSPA + WiFi
Screen:
3" 320 x 480 pixels
Camera:
5 megapixels
Size:
Small tablet
88 x 52 x 16mm / 94 grams
Bluetooth:
Yes
Memory card:
MicroSD
Infra-red:
No
Polyphonic:
Yes
Java:
Optional
GPS:
Yes
OS:
Android 2.3
Battery life:
4.5 hours talk / 14 days standby

oDesk Readiness test answers

oDesk Readiness test answers


Q no 1: If you have not done so please download and install the oDesk Team application. With the client running right click on the oDesk Team icon in the system tray (or doc for Mac users). Which of the following options is listed first? Note that you do NOT have to log into any actual Team Room to answer this question.

A: TeamRoom..


Q 2: Which of the following actions are NOT allowed when applying to job openings?

A: All of the above

Q:3 'How does feedback work on oDesk?'

A: All of the above


Q4: Which of the following break the oDesk user agreement?

A: All of the above

Q5: Which of the following is true of your oDesk timelog?

A: All of the above

odesk javascript solution JavaScript Test Solution

1. What’s relationship between JavaScript and ECMAScript? -
ECMAScript is yet another name for JavaScript (other names include LiveScript).
The current JavaScript that you see supported in browsers is ECMAScript revision 3.
2. What are JavaScript types? -
Number, String, Boolean, Function, Object, Null, Undefined.
3. How do you convert numbers between different bases in JavaScript? -
Use the parseInt() function, that takes a string as the first parameter, and the base as
a second parameter. So to convert hexadecimal 3F to decimal, use parseInt ("3F", 16);
4. What does isNaN function do? -
Return true if the argument is not a number.
5. What is negative infinity? -
It’s a number in JavaScript, derived by dividing negative number by zero.

6. What boolean operators does JavaScript support? -
&&, || and !
7. What does "1"+2+4 evaluate to? -
Since 1 is a string, everything is a string, so the result is 124.
8. How about 2+5+"8"? -
Since 2 and 5 are integers, this is number arithmetic, since 8 is a string, it’s concatenation,
so 78 is the result.
9. What looping structures are there in JavaScript? -
for, while, do-while loops, but no foreach.
10. How do you create a new object in JavaScript? -
var obj = new Object(); or var obj = {};
11. How do you assign object properties? -
obj["age"] = 17 or obj.age = 17.
12. What’s a way to append a value to an array? -
arr[arr.length] = value;
13. What is this keyword? -
It refers to the current object.

oDesk PHP interview questions and answers

PHP interview questions and answers
1. What does a special set of tags do in PHP?
The output is displayed directly to the browser.
2. What the difference is between include and require?
It is how they handle failures. If the file is not found by require(), it will cause a fatal error and halt the execution of the script. If the file is not found by include(), a warning will be issued, but execution will continue.
3. I am trying to assign a variable the value of 0123, but it keeps coming up with a different number, what’s the problem?
PHP Interpreter treats numbers beginning with 0 as octal. Look at the similar PHP interview questions for more numeric problems.
4. Would I use print "$a dollars" or "{$a} dollars" to print out the amount of dollars in this example?
In this example it wouldn’t matter, since the variable is all by itself, but if you were to print something like "{$a},000,000 mln dollars", then you definitely need to use the braces.
5. How do you define a constant?
Via define() directive, like
define ("MYCONSTANT", 100);
6. How do you pass a variable by value?
Just like in C++, put an ampersand in front of it, like $a = &$b
7. Will comparison of string "10" and integer 11 work in PHP?
Yes, internally PHP will cast everything to the integer type, so numbers 10 and 11 will be compared.
8. When are you supposed to use endif to end the conditional statement? - When the original if was followed by : and then the code block without braces.
9. Explain the ternary conditional operator in PHP? –
Expression preceding the ? is evaluated, if it’s true, then the expression preceding the : is executed, otherwise, the expression following : is executed.
10. How do I find out the number of parameters passed into function? func_num_args() function returns the number of parameters passed in.

oDesk HTML Tests and Solutions Answers

Which of the following value for the scrolling atribute from the fram tag is not valid?

a. yes
b. default
c. auto
d. no

Q.NO.12.

One of your Web pages named Listing.html you specified a target like this:

Old Listing


How will you make a link to the above target?

a. Check Old Listing as well

b. Check Old Listing as well

b. Check Old Listing as well

b. Check Old Listing as well

Thursday, April 28, 2011

Guide to Bypass the UDID Registration

There are 3 methods for Bypass the UDID Registration on testing the new iPhone OS 3.0

Method 1
  1. Stop iTunes from connecting to the internet.
    This is done simply by not having your computer plugged into the internet each time you plug in your iPhone/iPod Touch. This method is more for iPod Touchs because since you are not connected to the internet, you CANNOT activate your iPhone. This can be done by not having it plugged in or you can download this tool: Little Snitch (MAC ONLY) (160) if you have a Mac and deny iTunes access to the internet.
    Or this can be done by denying iTunes access using your Firewall.

Tuesday, April 26, 2011

PHP Test And solutions oDesk

which of the following are used for code reuse?

a. Loops
b. functions
c. Database
d. include files


Solution:

B,D

Question.13.

which of the following is the corect way of specifying default value?

a. Function GetDiscount($Type = "Special") {.........}
b. Function GetDiscount(Type := "Special") {.........}
c. Function GetDiscount($Type: = "Special") {.........}
d. Function GetDiscount($Type : "Special") {.........}

Solution:

Question.14.

Which of the following are ''magic constant'?

a. __LINE__
b. __FILE__
c __PRETTY_FUNCTION__
d __CLASS__
e. __METHOD__

Solution:

Question.15.

you have defined three variables $to, $subject, and $body to send an email. Which of the following methods would you use for sending an email?

a. mail($to, $subject,$body)
b. sendmail($to, $subject,$body)
c. mail(to, subject,body)
d. sendmail(to, subject,body)

Solution:

Cisco Discovery - DsmbISP Module 9 Final Exam - V.4 in english

Q.1 A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server ?

FTPS
HTTP
HTTPS
WEP2
TFTP


schéma1
Q.2. Refer to the exhibit. A new branch office has been added to the corporate network and anew router is to be installed to allow branch office users to access the database server at headquarters. How should the serial 0/0/0 interface of the new branch office router be configured to connect to the headquarters router ?

branch_23(config-if)# ip address 192.168.5.19 255.255.255.240
     branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation hdlc
     branch_23(config-if)# ip address 192.168.5.25 255.255.255.240
     branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
     branch_23(config-if)# no shutdown
branch_23(config-if)# encapsulation ppp
     branch_23(config-if)# ip address 192.168.5.33 255.255.255.240
branch_23(config-if)# encapsulation ppp
     branch_23(config-if)# ip address 192.168.5.21 255.255.255.240
     branch_23(config-if)# no shutdown


Q.3 Which two commands ensure that any password that permits access to the privileged EXEC mode is not shown in plain text when the configuration files are displayed ? (Choose two.)

Router(config)# enable secret cisco
Router(config)# enable cisco
Router(config)# encryption-password all
Router(config)# enable login encrypted
Router(config)# enable password encryption
Router(config)# service password-encryption

Chapter 1 Exam – IT Essentials PC Hardware and Software (Version 4.1)


1
Which type of memory is primarily used as cache memory?
#SdRAM

2
A customer orders a new computer and specifies an internal read-write, non-volatile storage device that uses low power, has fast access to data, and is reliable. What is a suitable storage device that meets these requirements?
#solid state drive

3
Which type of ROM can be reprogrammed with software while it is still physically installed in the computer?
#EEPROM

Post Summaries & Read More on Blogger

Blogger is fulfilling some of our expectations. Now blogger officially supports Post Summaries With Read more.This means that you wont need any JavaScript and CSS based tricks to display post summaries on Non-Post Pages.The static pages would be out soon. A screenshot on the official blogger buzz blog has made it more clear.
How Does This Work

Blogger has introduced something called jump breaks. This will help you in creating the summary.

What is a jump break? - Jump break is a special tag which can be inserted anywhere in a post using the post editor.When you have inserted a jump break into a post, the portion of the post above(or before) the jump break will serve as the summary of the post. This means that only this smaller portion will be displayed on Non-post pages.
How to insert a jump break?

If you are using the New Advanced Post Editor, then you can insert the jump break easily from the post editor.

If you are not using the New Post editor,then you will have to manually type the jump break tag . To do that just place

simple xp tips

1.Switch to welcome screen

Press Win+L to switch to the Welcome screen.

2.Lock your workstation

Press Win+L to lock your workstation.

3.Switch user easly

You can switch users without going through the Welcome screen: From Task Manager, go to the Users tab, right-click a user, and select Connect.

4.Hibrernate computer

Hold down the shift key in the shutdown dialog to change "Stand By" to "Hibernate". Or just press H to hibernate instantly. You can even use the Power Control Panel to configure your power button to hibernate.



5.Disable password when resuming stanby

To disable the password when resuming from standby or hibernation, open the Power Control Panel and uncheck "Prompt for password after returning from standby" on the Advanced tab.

Sunday, March 27, 2011

Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)

Final Exam for ch 1-10 - IT Essentials: PC Hardware and Software (Version 4.1)
1
A computer user buys a low priced replacement monitor but finds that there is a lot of flicker. The flicker makes the monitor unusable. Which characteristic of a monitor needs to be considered to ensure flicker-free viewing?
#refresh rate

2
When analyzing a protocol used on the network, it is discovered that multicast messages are being sent to network devices. Which class of IP addressing is being used to send these messages?
#D

3
A technician notices that a data floppy disk is in the floppy disk drive of a computer when it is powered on. Which error message could this potentially cause?
#invalid system disk

4
What characterizes spoofing?
#Making data appear to come from a source other than the actual source.

5
When a Windows XP computer has completed the POST for each adapter card that has a BIOS, what is the next step during the boot sequence?
#BIOS reads the MBR.

6
When calculating the total cost of ownership of a printer it is necessary to consider the cost of the consumables. Which two consumables are associated with an inkjet printer? (Choose two.)
#ink cartridge
#paper

7
Which protocol adds security to remote connections?
#SSH

8
What is the purpose of an IRQ?
#Request information from the CPU.

9
A wireless LAN is being deployed inside the new park ranger, one room office that is located at the highest part of the national park. When the testing was completed, the technicians reported that occasionally, the wireless LAN signal is affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)
#the number of wireless devices that are used in the wireless LAN
#the large number of trees that surround the office

10
When installing a service pack or security patches on an operating system, what should be done to protect the system in the event of a faulty or aborted installation?
#Create a restore point.

11
A technician is asked to wire a network that supports CSMA/CD. Which architecture and physical topology should the technician use for supporting this access control method?
#Ethernet and Star

12
What is the best way to fully ensure that data is unable to be recovered from a hard drive?
#shattering the hard drive platters with a hammer

13
A technician is asked to configure the time the system must be idle before the hard disk spins down on all the Windows-based laptops in the company. The technician configured the power options in Windows but it appears to have no effect. Where should the technician look to enable power management?
#System Registry

14
A printer has a paper jam. An impatient user has sent multiple print jobs of the same document to this printer. What can be done to remove these print jobs?
#Cancel the jobs in the printer queue.

15
ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?
#RAID adapter

16
A call center technician has asked a customer to perform a simple operation to fix a problem on a computer. The customer seems unable to perform the task. What should the technician do?
#Determine whether the customer would prefer to receive the instructions in another form, such as e-mailed, illustrated written instructions.

17
Which two technologies enable printers to be accessed by multiple network users? (Choose two.)
#Wi-Fi
#Ethernet

18
A user reports that a printer is printing unknown characters on documents. What is a possible solution to this issue?
#Uninstall and reinstall the printer driver.

19
Which network device uses a MAC address table to segment the network?
#router

20
A technician needs to configure the hard drive on a computer so that there appears to be one drive for the operating system and four drives for data from different applications. How can the hard drive be configured to provide this perception?
#Create one primary partition and one logical partition with four logical drives within it.

21
A supervisor received a complaint that one of the technicians was rude and disrespectful. Which action by the technician most likely caused the customer to complain?
#The technician interrupted a number of times to ask questions.

22
A technician is troubleshooting a user complaint that a printer is not printing a report. Which step is one of the first that the technician should take?
#Check the Device Manager on the user computer for hardware problems.

23
Which Registry file contains information about all software that is installed on a Windows XP computer?
#HKEY_LOCAL_MACHINE

24
A hacker is detected using commonly available wireless hacking tools to access encrypted wireless network communication. Which resolution would prevent this action?
#Change the SSID that is being used on the wireless network.

25
Which two general precautions should be taken before replacing any non-hot-swappable laptop component? (Choose two.)
#Disconnect the power cord.
#Remove any batteries.

26
Which power mode should be used by a laptop so that all the data is saved, all the applications the user was working on are left open, and there is no power used by the laptop?
#Hibernate

27
What is the purpose of SCSI and RAID adapters?
#to connect storage devices such as hard disk drives to a PC

28
Which network protocol is used to automatically assign an IP address to a computer on a network?
#DHCP

29
A customer used the convert.exe utility to take advantage of NTFS security features. The customer later discovered that the application on the computer can only read FAT32 files. After the hard drive was formatted back to FAT32, the customer noticed all of the data files are missing. What should the customer do next?
#Restore the data files that were backed up in preparation for the conversion.

30
Which two components normally require a laptop to be powered down and the battery removed before removing the components? (Choose two.)
#internal hard drive
#RAM

31
A customer reports that after using a computer for over a year, the computer now takes more time to access the files. Which management tool can be used first, before any other complex procedure?
#defrag

32
A customer needs to purchase a new power supply for a computer. What must be considered when selecting an appropriate power supply?
#The power supply has sufficient wattage to support all components inside the computer.

33
What is a benefit of using the USB or FireWire ports to connect peripherals to a laptop?
#The peripherals can be plugged in and out without turning the laptop off.

34
A small business has used a high quality configurable flatbed scanner to scan a number of photographs to print as large posters. However, the quality of the images printed as posters is poor. What should the user do?
#Increase the resolution of the scanner.

35
A user has been writing data to a USB flash memory drive. What should the user do before removing the device?
#Click on the Safely Remove Hardware icon in the system tray then on the device.

36
A technician installed a network adapter in a computer and wants to test network connectivity. The ping command can only receive a response from local workstations. What could be causing the problem?
#The default gateway is not set.

37
A technician is explaining the differences between inkjet printers and laser printers to a customer. Which two comparisons should the technician make? (Choose two.)
#Inkjet printers are less expensive than laser printers.
#The laser printer output is dry after printing, but an inkjet printer may still have wet ink on the paper after printing.

38
A network administrator is troubleshooting a server that keeps crashing. While monitoring traffic to the server, the administrator notices repeated, larger than normal pings to the server. What is the name of this type of attack?
#ping of death

39
A technician wants to create a new partition on a new additional hard drive. Which tool should be used?
#Disk Management

40
Which two quick solutions are commonly recommended when a technician is troubleshooting a laptop? (Choose two.)
#Reboot the laptop.
#Disconnect the peripherals.

41
A company uses a single computer to receive and test all Windows updates. When the most recent update was installed, several programs failed. What is the first course of action that a technician should attempt to remove the update?
#Run a System Restore from the last restore point.

42
A mobile training room uses a generator to power the PCs, servers, and printers. The company that runs the room upgraded the equipment but then found that when all the devices are powered up they become unreliable, with some PCs shutting down. What may cause this power problem?
#The power consumption of all devices is too much for the electrical circuit that is provided.

43
When installing the Windows XP operating system, a technician is given a choice of file systems to use. If security is a requirement, which file system should be chosen?
#NTFS

44
A technician has replaced a failing floppy drive. While testing the new drive, the technician notices that the floppy drive light remains lit constantly. What is most likely the cause of the problem?
#The ribbon cable is installed incorrectly.

45
Which two types of connectors can be found on DVI cables? (Choose two.)




46
Which Windows tool should be run before upgrading the operating system?
#Ntbackup

47
The technician has been asked to upgrade the printer driver for an old printer. What is the best source for a new driver?
#manufacturer's website

48
Where can a user change the idle time after which a laptop will switch to standby mode?
#Left-click Start > Control Panel > Power Options, then click the Power Schemes tab.

49
A home computer owner has a PC system that runs Windows XP. For security reasons the owner has been using a limited local user account for a number of years. The owner wishes to install a new piece of software, but the user account does not have the necessary permissions. Which type of account does the owner need to use to install the new software?
#administrator

50
A student enables file sharing on a laptop so that a friend can access music files. Which type of service is being configured?
#peer-to-peer

51
What do the terms refresh rate, interlace, and aspect ratio explain?
#image properties of a monitor

52
A technician wishes to boot a computer using a CD-ROM that contains a limited operating system and diagnostic utilities. Where would the technician set the boot order for the PC?
#BIOS

IT Essential v4.1 Chapter 10

IT Essential v4.1 Chapter 10
1.Which three pieces of information should be given to the next technician when transferring a customer? (Choose three.)
*your name
*ticket number
*customer name
2.The technician begins diagnosing a problem by asking an experienced customer to visit a troubleshooting Web site. The customer becomes angry because she feels this could be done without calling the technician. What should the technician do?
*Explain how the Web site can be used by both of them during the call to quickly eliminate problems.
3.Which two approaches are recommended when dealing with customers on the telephone? (Choose two.)
Be positive.
*Look for alternative ways to help the customer.
4.Which two guidelines demonstrate proper netiquette? (Choose two.)
*Begin each e-mail with an appropriate greeting.
*Avoid replying to “flames”.
5.A customer calls to complain that another technician was rude to them. In the past, the technician has received many complaints about rudeness regarding this coworker. How should the technician handle this complaint?
*Listen to the complaint and explain that the coworker is frequently rude.
6.While a technician is listening to a lengthy explanation of a problem, the technician identifies the solution to the problem. How should the technician proceed?
*Wait until the customer has finished speaking, and then explain the possible solution.
7.A technician is talking on the telephone to an angry customer who is unhappy with previous service. How should the technician calm the customer?
*Listen carefully and attempt to solve the customer’s problem.
8.Which three techniques should be used to successfully deal with a talkative customer? (Choose three.)
*Politely interrupt to refocus the customer.
*Gather as much information as possible while the customer is talking.
*Allow the customer to talk for one minute and then ask closed-ended question to regain control of call.
9.Which three items are commonly parts of a service level agreement (SLA)? (Choose three.)
*supported software
*diagnostic procedures
*service location
10.Which two techniques should be used when dealing with an inexperienced customer? (Choose two.)
*Use simple step-by-step instructions.
*Speak in plain terms.
11.When dealing with an angry customer, which two things can a technician do to resolve the problem? (Choose two.)
*Allow the customer to explain the problem, possibly dispelling some of the anger.
*Sympathize with the customer’s problem.
12.A customer calls to report a computer problem. Which two actions can the technician use to establish a good rapport with the customer? (Choose two.)
*Allow the customer to speak without interruption.
*Refer to the customer by name whenever possible.
13.A technician is trying to calm an angry customer. What is the best approach?
*Maintain a positive tone of voice and offer to help solve the problem.
14.Which three relaxing techniques can help relieve the stress caused from helping customers in a call center? (Choose three.)
*Go for a quick walk.
*Listen to soothing sounds.
*Practice relaxed breathing.
15.What is the recommended way to place customers on hold?
*Ask and wait for permission before placing customers on hold.
16.What are three guidelines for beginning a call with a customer? (Choose three.)
*Determine the level of knowledge that the customer possesses about computers.
*Use brief communication to establish a one-to-one connection with the customer.
*Call the customer by name.
17.A technician receives a call from a customer who is too talkative. How should the technician handle the call?
*Allow the customer to speak without interruption and then try to use closed-ended questions to gather data.
18.Which issue is an example of an exception to an SLA that should be escalated to a manager?
*A customer wants two new computers added to the existing SLA without additional cost.
19.Which three tasks are commonly carried out by a level-one technician? (Choose three.)
*document all information on the work order
*prioritize the problem
*gather information from the customer
20.A technician wants to apply for a job in a call center for a computer repair service. Which two characteristics are desirable for this type of position? (Choose two.)
*possess good listening skills
*display professional behavior at all times

IT Essential v4.1 Chapter 11

1.A technician suspects that a hard drive is beginning to fail. Which two conditions would support this suspicion? (Choose two.)
*The hard drive is making unusual noises.
*The hard drive has a gradual increase in the number of bad sectors.

2.Which two problems are caused by inadequate CPU cooling and ventilation? (Choose two.)
*The computer locks up.
*The computer does not boot.

3.A technician fails to successfully boot a computer into Safe Mode. The technician then successfully boots the computer using a Windows boot disk. What is the most likely cause of the problem?
*hard drive failure

4.A technician is concerned that a computer is overheating. The computer reboots without warning. What can the technician do to improve the circulation of air through the computer?
*Replace the case with one that has front air vents.

5.A customer needs help selecting a new power supply for an existing computer. Which two questions should a salesperson ask to help the customer? (Choose two.)
*What is the size of the case, and which type of motherboard is in the computer?
*Which components are currently being used on the computer, and what new components may be added to the computer?

6.Which three computer system capabilities should a technician consider when installing a video capture card? (Choose three.)
*processor speed
*amount of RAM
*VGA adapter specification

7.A customer is interested in video editing and has purchased a FireWire hard drive for storage of videos. However, no FireWire ports are available on the motherboard. What type of adapter will the customer be interested in obtaining?
*eSATA

8.Which tool would be the best to use to test the voltage output on every pin of a SATA connector?
*multimeter

9.When a computer boots, the hard disk is not recognized. What are two possible causes of the problem? (Choose two.)
*The power cable is not attached properly to the drive.
*The data cable is loose or disconnected.

10.A computer system keeps losing the date and time or requesting to go into the Setup program during the boot process. What are two possible solutions? (Choose two.)
*Replace the motherboard battery.
*Verify that the motherboard battery is secure.

11.A technician is upgrading a computer motherboard and has successfully replaced a single core CPU with a dual core CPU. What should be checked to ensure that the dual core CPU now operates correctly?
*Ensure that the front-side bus settings match the speed of each CPU core.

12.When testing the 6-pin PCIe connector with a multimeter, what should the voltage read?
*12 V

13.Why is a solid state drive more reliable than a traditional drive?
*It has fewer moving parts.

14.A motherboard flash BIOS has been updated. After the update, the computer restarts, but does not boot. The technician examines the motherboard documentation and discovers the motherboard has only one BIOS chip. What will the technician have to do to fix this problem?
*Obtain a replacement BIOS chip.

15.Which two ports are used to connect external media readers to a computer? (Choose two.)
*FireWire
*USB

16.A technician begins gathering data from a customer by asking open-ended questions. Which question is a proper open-ended question?
*What happens when the PC is powered on?

17.What type of motherboard bus carries memory locations?
*address

18.A technician needs to retrieve a DVD from an optical drive that is jammed and fails to open. What is the best method the technician could use to retrieve the DVD?
*Insert a pin in the small hole next to the eject button.

19.What is the purpose of the copper or aluminum between a processor and the fan on a computer motherboard?
*It elevates the processor in the case to improve airflow.

20.Which two motherboard features must be compatible when selecting a new CPU? (Choose two.)
*chip set
*socket type

21.You are monitoring a new technician installing a device driver on a Windows-based PC. The technician asks why the company requires the use of signed drivers. What would be the best response to give?
*A signed driver has passed Microsoft’s quality lab test and prevents a system from being compromised.

22.What manufacturing process makes a multicore processor operate faster than a single-core processor on the same motherboard?
*The multicore processors are designed with multiple processors integrated into the same circuit.

23. A technician is helping a client select additional RAM for a computer. Which three items should be considered when updating RAM? (Choose three.)
*The memory must be compatible with the video card.
*The memory must be compatible with the motherboard.

24.On what media is information stored when an SSD is installed?
*static RAM

25.What are two probable causes of a computer failing to recognize a newly installed storage device? (Choose two.)
*The device jumpers are set incorrectly.
*The system BIOS settings are incorrect.

26.A new sound card has just been installed, but no sound reaches the speakers. What are two common solutions a technician might implement? (Choose two.)
*Connect the speakers to the correct port.
*Unmute the sound through the operating system.

27.A motherboard has a 64-bit bus. What does this mean?
*The processor buffers 64 bits of data each clock cycle.

IT Essential v4.1 Chapter 15

IT Essential v4.1 Chapter 15
1.When planning the network in a new building, the technician notes that the company requires cabling that can extend up to 295 ft (90 m) with enhanced bandwidth support at an affordable price. Which cable type will the technician pick if he chooses the most common type of cabling used on networks?
*Cat5e

2.The network administrator has physically installed wireless NICs in three new computers. Which two additional steps will complete the installation process? (Choose two.)
*Configure the device drivers.
*Configure the NICs with addressing information.

3.A company adds a few refurbished computers to a network. The company finds, however, that the refurbished computers perform significantly worse than the original networked computers performed with applications that require the transfer of data over the network. What should the company technicians do?
*Check if the network interface cards in the computers are limited to 10 Mb/s.

4.ABC Computer Company is in the process of planning a network for a new client. A network technician has been asked to perform a physical inspection of the facilities to determine the flow of data and protocols required by the client. What is this inspection called?
*site survey

5.Which protocol provides secure transport of data from the company web server to remote users?
*HTTPS

6.n Internet Explorer, after choosing Tools and then Internet Options, which tab would a user select to set the browser to prompt before downloading potentially unsafe content?
*Security

7.Which two methods can be used to connect IP phones to a network? (Choose two.)
*Connect the IP phone to the Ethernet LAN using an RJ-45 connector.
*Establish an Internet connection then use an Analog Telephone Adapter.

8. technician is working on a host computer that fails to obtain an IP address. Which three actions could the technician perform to determine the cause of the problem? (Choose three.)
*Check the local router to make sure the default gateway is correct.
*Check that the DCHP server is operational.

9.Which three ports are used by SMTP, POP, and IMAP? (Choose three.)
*25
*110
*143

10.Which two ipconfig parameters are used within Windows XP to remove and assign the IP address previously provided by a DHCP server? (Choose two.)
*release
*renew

11.The network technician has been asked to share a new printer on the network using the Add Printer wizard for Windows XP. Which path should the technician use to run the Add Printer wizard?
*Start > Control Panel > Printers and Faxes > File > Add Printer

12.Students on the college network need to be able to view folder names and data in files stored on the Windows-based file server, but should never be allowed to add or save information on the server. Occasionally, the students also need to run media programs to watch videos stored on the server. Which permission should the network technician assign to the students accessing the file server?
*read

13.Which two hazards exist when working with fiber optic cabling? (Choose two.)
*chemicals
*glass splinters

14.A technician is troubleshooting a network and finds hosts with duplicate static IP addresses. Which protocol could be used to resolve this issue?
*DHCP

15.Which action should a user take to ensure that personal information that is entered into a website form is not retained on the computer?
*Delete the temporary Internet files.

16.A computer user cannot access a bank using HTTPS. What is one recommended solution?
*Enable SSL through the web browser application.

17.What is the purpose of an analog telephone adapter in the application of VoIP services?
*to convert IP phone digital voice data to analog signals

18.Which safety precaution should be used when working with any type of cable?
*Wear safety glasses when working any type of cable.

19.Refer to the exhibit. The tracert command was used on the local computer to verify connectivity with a remote site. Which type of address is shown in the highlighted line of the tracert command output displayed in the exhibit?
*default gateway for the local computer

20.After booting a computer running Windows 2000, the following message displays: “The IP address already exists on another computer”. Which two steps will quickly obtain a new IP address from the DHCP server? (Choose two.)
*run ipconfig /release
*run ipconfig /renew

21.A technician is configuring a network device for remote access. Which protocol is commonly used as a secure alternative to Telnet?
*SSH

22.What would be a disadvantage of configuring a wireless router or access point to operate only in accordance with the 802.11n protocol standard?
*The 802.11n standard does not support advanced network security features.

23.What are two possible causes of e-mail attachments not being received with e-mail messages? (Choose two.)
*The e-mail attachments could be too large.
*The e-mail server could not be receiving e-mail messages that are using POP.

24.What are two ways to assign an IP address to a wireless NIC? (Choose two.)
*Assign a static address.
*Use DHCP.

25.While using nslookup, a student sees the following message: “Can’t find server name for address 127.0.0.0: timed out.” What is one possible problem?
*The computer does not have at least one entry for a DNS server configured.

26.A user is receiving e-mail on a regular basis from a particular person. A problem occurs when the e-mail from this same person contains an attachment. What is one solution?
*Ask the IT department to permit port 25 through the firewall.

27.A new employee needs to transfer files to the corporate FTP server. However, the employee is unable to log in to the FTP server. What is the most likely cause of the problem?
*An incorrect port number is configured in the FTP client.

28.A textbook author needs to upload a chapter from a home computer to the FTP server of the publisher. The author uses the correct username and password, but the transfer fails. What is the most likely cause of the problem?
*Port 21 should be enabled on the home firewall.

29.While troubleshooting a computer, the technician releases and renews the IP address. A message appears: “No operation can be performed on the adapter while its media is disconnected.” What is a probable cause of the message?
*The network cable is unplugged.

30.The network technician is researching the best way to connect the branch offices to the main office. What are three main considerations that the technician should remember when choosing an Internet connection? (Choose three.)
*availability
*reliability
*speed

IT Essential v4.1 Chapter 14

IT Essential v4.1 Chapter 14
1.Which two parts, one in a laser printer and one in a dot matrix printer, should be allowed to cool before attempting any repairs? (Choose two.)
fuser assembly
print head

2.Which two pieces of software are included with most new printers and are installed by the user? (Choose two.)
configuration software
printer driver

3.Which Windows component allows the Windows operating system to output graphics to a computer screen or print device?
GDI

4.A user reports that whenever he needs to print a document, the print job process is automatically sent to the wrong network printer. Which path should the user follow to resolve this problem in Windows XP?
Start > Control Panel > Printers and Faxes, right-click the printer, and then select Set as Default Printer

5.A technician is installing a new inkjet printer. The printer has successfully printed test pages. Which task also verifies the functionality of an inkjet printer after installing the printer driver?
using different types of paper trays for special paper sizes

6.Which two methods are often used to connect a lower-cost printer to a Windows XP network? (Choose two.)
Use a separate print server.
Connect to a networked computer and share the printer.

7.Which two issues should be considered when purchasing RAM for a new printer? (Choose two.)
physical type of memory
number of memory slots available

8.Which scanner option considerably affects the size of the output file?
resolution settings

9.A technician has completed the routine maintenance service for all the printers in the accounting department. Which action helps ensure that the next routine maintenance service is performed at the correct time?
Reset the counters.

10.Users working in humid environments notice that documents printed by a laser printer are of poor quality. It is discovered that the printer is unable to attach toner to the paper. What is the most likely cause of the problem?
The paper absorbed moisture from the air and is damp.

11.Which two printer parts should be cleaned with a damp cloth? (Choose two.)
roller surfaces in dot matrix printers
print head in inkjet printers

12.As a part of the maintenance process for a laser printer, a technician should remove all the small particles of toner inside the printer. What is the recommended method to perform this task?
Use a vacuum cleaner with HEPA filtration.

13.Which two items can help extend the life of an inkjet printer? (Choose two.)
type of ink
paper type

14.Which type of printing option should be implemented to allow a user to change settings for each document sent to the printer?
per-document

15.Users in the accounting department are having trouble digitizing documents with a scanner. What should the technician do to resolve the problem?
Calibrate the scanner.

16.Which type of port is used for low-speed dot matrix printers?
Serial

17.Which path will allow a user to add a printer in Windows XP?
Start > Control Panel > Printers and Faxes > Add a Printer

18.A technician is installing network printer software and drivers on a Windows Vista computer. At the Select a Printer stage the technician wants to install a printer that is not listed. Which two methods are available to identify and select the required printer? (Choose two.)
name
IP address

19.What two solutions would fix the problem that occurs when every page that is printed by a laser printer produces lines or streaks? (Choose two.)
Replace the drum.
Use the cleaning utility to clean the cartridge nozzles.

20.What could be a result of printing with paper that has become damp because of high humidity?
Unusual characers are printed.

IT Essential v4.1 Chapter 14

IT Essential v4.1 Chapter 14
1.Which two parts, one in a laser printer and one in a dot matrix printer, should be allowed to cool before attempting any repairs? (Choose two.)
fuser assembly
print head

2.Which two pieces of software are included with most new printers and are installed by the user? (Choose two.)
configuration software
printer driver

3.Which Windows component allows the Windows operating system to output graphics to a computer screen or print device?
GDI

4.A user reports that whenever he needs to print a document, the print job process is automatically sent to the wrong network printer. Which path should the user follow to resolve this problem in Windows XP?
Start > Control Panel > Printers and Faxes, right-click the printer, and then select Set as Default Printer

5.A technician is installing a new inkjet printer. The printer has successfully printed test pages. Which task also verifies the functionality of an inkjet printer after installing the printer driver?
using different types of paper trays for special paper sizes

6.Which two methods are often used to connect a lower-cost printer to a Windows XP network? (Choose two.)
Use a separate print server.
Connect to a networked computer and share the printer.

7.Which two issues should be considered when purchasing RAM for a new printer? (Choose two.)
physical type of memory
number of memory slots available

8.Which scanner option considerably affects the size of the output file?
resolution settings

9.A technician has completed the routine maintenance service for all the printers in the accounting department. Which action helps ensure that the next routine maintenance service is performed at the correct time?
Reset the counters.

10.Users working in humid environments notice that documents printed by a laser printer are of poor quality. It is discovered that the printer is unable to attach toner to the paper. What is the most likely cause of the problem?
The paper absorbed moisture from the air and is damp.

11.Which two printer parts should be cleaned with a damp cloth? (Choose two.)
roller surfaces in dot matrix printers
print head in inkjet printers

12.As a part of the maintenance process for a laser printer, a technician should remove all the small particles of toner inside the printer. What is the recommended method to perform this task?
Use a vacuum cleaner with HEPA filtration.

13.Which two items can help extend the life of an inkjet printer? (Choose two.)
type of ink
paper type

14.Which type of printing option should be implemented to allow a user to change settings for each document sent to the printer?
per-document

15.Users in the accounting department are having trouble digitizing documents with a scanner. What should the technician do to resolve the problem?
Calibrate the scanner.

16.Which type of port is used for low-speed dot matrix printers?
Serial

17.Which path will allow a user to add a printer in Windows XP?
Start > Control Panel > Printers and Faxes > Add a Printer

18.A technician is installing network printer software and drivers on a Windows Vista computer. At the Select a Printer stage the technician wants to install a printer that is not listed. Which two methods are available to identify and select the required printer? (Choose two.)
name
IP address

19.What two solutions would fix the problem that occurs when every page that is printed by a laser printer produces lines or streaks? (Choose two.)
Replace the drum.
Use the cleaning utility to clean the cartridge nozzles.

20.What could be a result of printing with paper that has become damp because of high humidity?
Unusual characers are printed.

Sunday, February 27, 2011

IT Essential v4.1 Chapter 4-5

IT Essential v4.1 Chapter 4-5
1. Refer to the exhibit. During a Windows Vista installation, the Select Your Computer’s Current Location screen fails to display. What could be a possible reason for the absence of this screen?
*The network card driver was incorrectly installed.

2. When troubleshooting a printer problem, a technician finds that the operating system was automatically updated with a corrupt device driver. Which solution would resolve this issue?
*Roll back the driver.

3. Which three settings are available to personalize the appearance of the desktop on a Windows Vista computer? (Choose three.)
*Theme
*Screensaver
*Taskbar Properties

4. In which two situations should a technician create a restore point? (Choose two.)
*before an operating system update
*before installing a new device driver

5 .A user is running Windows Vista and has an application that runs in Windows XP but the application fails to run in Vista. In which Vista mode should the user try running the application?
*compatibility mode

6. A user in a large manufacturing company uses a PC that is connected to the company network. Where should the user look to find a server attached to the network?
*My Network Places

7. Refer to the exhibit. During the installation of Windows Vista, you are prompted with a screen that asks for a username and password. What type of account is created when you select Next after entering a username and password?
*A user that has Super User rights for this installation.

8. A technician has a computer that is unable to boot Windows XP properly. The technician has decided that it is necessary to attempt a repair of XP. Which utility will be run if the technician selects Repair XP from the XP boot disk?
*Recovery Console

9. When a computer boots from the Windows Vista disc, which three functions are performed if the Custom (advanced) option is selected? (Choose three.)
*Changes to disk partitions can be made.
*A clean copy of Windows Vista is installed.
*The location of the Windows installation can be selected.

10. What are two features of upgrading Windows 2000 to Windows XP? (Choose two.)
*The file system is upgraded to NTFS.
*Windows 2000 applications and settings are kept.

11. Which set of guidelines is used to ensure that programmers develop applications that are compatible with an operating system?
*API

IT Essential v4.1 Chapter 6

IT Essential v4.1 Chapter 6
1. What is meant by a laptop device being hot-swappable?
*The laptop does not need to be powered off to install or remove the device.

2. Where can a technician change the power schemes on a laptop running Windows XP?
*Select Power Options from within the Control Panel.

3. What is the proper way to clean optical drives?
*Use a cleaning disc for optical drives.

4. Which generation of cell-phone standards was the first to deal with how to send and receive text, photographs, and video?
*third

5. Which name is given to the collection of settings that control the power settings of a laptop?
*power schemes

6. Refer to the exhibit. What is the correct order of steps to remove a laptop battery?
*2, 3, 4, 1

7. A technician is responding to a helpdesk ticket for a laptop that has a distorted image of the Windows desktop. What is one possible solution?
*Obtain an updated display driver from the laptop manufacturer.

8. Which three components are interchangeable between desktop and laptop computers? (Choose three.)
*printer
*scanner
*USB flash drive

9. Refer to the exhibit. A laptop has these graphics on specific keys on the keyboard. Which key would be used in conjunction with the Fn key to connect a laptop to an external monitor?
*F8

10. What power mode is commonly known in the Windows environment as suspend mode?
*S4

11. Which Windows XP or Vista control panel is used to reduce power when the computer has not been used by anyone for an hour?
*Power Options

12. Which two characteristics make laptops a better choice than desktop computers? (Choose two.)
*mobility
*size

13. During the set up of a network connection, which option can be double-clicked to configure an IP address on an Ethernet NIC?
*TCP/IP or TCP/IPv4

14. Which type of interface do current laptops use to achieve similar expansion capabilities as desktops?
*PC ExpressCard

15. Which two actions should be performed to clean the surface of CDs and DVDs? (Choose two.)
*Use a lint-free cotton cloth.
*Wipe the disc from the center outward.

16. Which two devices can be individually configured within Windows XP to power off after the laptop has been idle for a given period of time? (Choose two.)
*disk drive
*monitor

17. A technician is replacing a laptop SODIMM. With what component is the technician working?
*RAM

18. Which internal laptop component may be designed as a hot-swappable device?
*optical drive

19. Which two devices are commonly hot-swappable on laptops? (Choose two.)
*PC Card
*USB Drive

20. How should a hot-swappable device normally be removed from a laptop?
*Use the Safely Remove Hardware systray icon.

21. Which option within the Windows Control Panel is used to install a modem?
*Phone and Modem Options

22. Which display technology is most commonly found in modern laptop computers?
*LCD

23. Which two laptop ports are used primarily for communication and network connectivity? (Choose two.)
*Ethernet
*modem

24. What feature is provided by an auto-switching power supply on a laptop?
*The laptop can switch from AC input power or battery-provided power instantaneously.

25. A technician has been called in to troubleshoot a laptop that fails to power on. The technician repeatedly pushes the power button without any results. What should the technician do next?
*Attach the AC adapter.

26.What is the major difference between desktop and laptop motherboards?
*Desktop motherboards typically have a standard form factor and are interchangeable while laptop motherboards are proprietary.

27. Which three components commonly connect to USB or FireWire ports? (Choose three.)
*camera
*printer
*scanner

28. Refer to the exhibit. Which two form factors are supported by the devices shown in the graphic? (Choose two.)
*34mm wide
*45mm wide

IT Essential v4.1 Chapter 7

IT Essential v4.1 Chapter 7
1. Which printing technology uses the vibration of a crystal to control the flow of ink onto the paper to produce an image?
*electrostatic

2. Which printer technology is used in low-cost, photo-quality printers?
*inkjet

3. What laser printer component could cause streaking?
*drum

4. Which step of the laser printing process involves scanning the photosensitive drum with a laser?
*writing

5. Which software, embedded in a printer, controls how the printer operates and can be upgraded?
*firmware

6. What is a common disadvantage of inkjet printers?
*The nozzles can get obstructed.

7. What is the best source for a Windows-compatible scanner driver?
*website for scanner manufacturer

8. What are two advantages of using impact printers? (Choose two.)
*carbon-copy printing ability
*inexpensive consumables

9. Which standard governs the use of parallel printer ports?
*IEEE 1284

10. Which technology is used by laser printers?
*electrophotographic

11. Which Windows XP command sends a file named example.txt to the default printer?
*print example.txt

12. Instead of the document that was expected, a printer is printing unusual characters. What should be the next steps in solving this printer problem?
*Check the printer data cabling. If the cabling is secure on both ends, replace the print cartridge or ribbon.

13. Which type of printer is commonly used in stores to produce cash register receipts?
*thermal

14. Which two names refer to the IEEE 1394 standard? (Choose two.)
*FireWire
*i.Link

15. Which three functions are commonly included in the all-in-one devices? (Choose three.)
*fax
*printer
*scanne

16. A museum possesses several old paintings that the curators wish to reproduce and sell in the museum gift shop. Which type of scanner can be used to produce the highest-quality reproduction?
*drum

17. Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose two.)
*ECP
*EPP

18. Which unit is commonly used to measure the print quality of an inkjet printer?
*DPI

19. Which step of the laser printing process is the last step performed by a laser printer when printing a document?
*fusing

20. Which software converts scanned pages into text?
*Optical Character Recognition

21. What is typical of a network printer installation?
*the use of Ethernet or wireless

22. What is the maximum number of devices that can be connected to a single FireWire interface?
*63

23. What is an advantage of using a solid-ink printer instead of an inkjet printer?
*It produces vivid color prints.

24. Which two Wi-Fi standards are used to provide a wireless connection between printers and computers? (Choose two.)
*802.11b
*802.11g

25. Which laser printer component is a metal cylinder that is coated with a light-sensitive insulating material?
*drum