Wednesday, November 23, 2011

Free Comptia HT0-102 Q & A / Study Guide


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following serial protocols allows the daisy chaining of devices

A. Fire Wire
B. RS-232
C. RS-422
D. RS-485

Answer: D


QUESTION 2
Which of the following is a requirement of a home automation system that allows the system to
be set up for out of band remote maintenance from an off-site location

A. Dial-in modem
B. Local terminal
C. Infrared remote
D. Wireless access point

Answer: A


QUESTION 3
Which of the following is a support that is mounted to the backboard and used to manage cables

A. Conduit
B. 66 block
C. D-ring
D. Cable tray

Answer: C


QUESTION 4
A technician is programming the locations for 802.11 devices used in home automation. Which
of the following describes the Layer 2 address of the OSI model

A. IP address
B. MAC address
C. X10 address
D. 802.11 address

Answer: B


QUESTION 5
The design of a system requires a wall-mounted control device that works with a RS-485 based
control processor. Control needs to be available at 16 locations. The interface should allow the
technician to customize the menu options with icons and text associated with each of the push
buttons. Which of the following meets the design criteria

A. Web pad
B. LCD keypad
C. If remove control
D. Touch screen controller

Answer: B


QUESTION 6
One of the devices used to control a multimedia center uses serial communications to receive
instructions from he system controller. The device needs to be tested off-line, and it has been
disconnected from the system controller. A notebook computer equipped wit ha serial port is
available for testing. Which of the following cables will complete the connection

A. Coaxial
B. Patch
C. Telephone
D. Null-modem

Answer: D


QUESTION 7
An integrated home automation system is being designed to use a personal computer equipped
with a single IEEE 1394 port. What is the total number of devices that additional ports are
needed

A. 23
B. 43
C. 63
D. 83

Answer: C


QUESTION 8
Which of the following methods offer protection from attenuation in larger installations using an
X10 protocol to control devices

A. IR repeater
B. Signal bridge
C. RS-232 to RS-485 converter
D. 75 ohm to 100 ohm converter

Answer: B


QUESTION 9
The IEEE 1394 interface is commonly referred to as

A. SCSI
B. FireWireTM
C. Fast Ethernet
D. Gigabit Ethernet

Answer: B


QUESTION 10
Which of the following standards has the greatest maximum distance from the central office of
the telephone company to the home

A. ADSL
B. SDSL
C. IDSL
D. G.SHDSL

Answer: C


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Monday, November 14, 2011

Twitter research: It's where the money and action is

Wellesley College profs investigating social media information trustworthiness, while University of Cincinnati students want to help you party


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



Two professors from Wellesley College’s Department of Computer science have been awarded a nearly half million dollar National Science Foundation grant to build an application that gauges the trustworthiness of information shared on social networks, and in particular Twitter.

"Users leave a digital trace behind when they make an announcement," says Eni Mustafaraj a visiting assistant professor who along with Computer Science Professor Panagiotis Metaxas earned attention last year for research into Twitter bombing used to influence voters during the 2010 Massachusetts special congressional election (and there work has been built upon in other states, such as Indiana). "The application will follow those digital traces to determine whether a message sender is reputable, allowing the user to make a determination about whether a message should be trusted."

NETWORK WORLD’S HOTTEST TECH ARGUMENTS: Allow social media vs. Ban social media at work

Determining the trustworthiness of information sources on social networks is becoming more important as more people rely on such information to make financial, medical and other decisions. The researchers had planned initially to focus on spammer identification, but have broadened their effort to help social network users determine whether whatever information they are looking at should be trusted.

Factors going into trust measurement include past history of the originating sender, whether other Twitter users trust it and whether the same info is mysteriously surfacing from separate sources.

The NSF grant will also fund development of an online course to teach undergrads and high school students to think critically about information sources.

TWEETOGRAPHER IS BORN

Separately, a pair of University of Cincinnati computer science students will have to wait for their Twitter payday, but they’ve got a good start by creating a Web-based app called Tweetographer that helps users mine for useful data in Twitter about what’s going on in their area.

Billy Clifton and Alex Padgett’s "Tweetographer," their six-month senior project, is described as a real-time events guide extracted from information coming via large numbers of tweets. Their work included coming up with a queuing system to process the flood of tweets and deciphering shorthand used by tweeters for days of the week, locations and such.

"We wanted to explore data mining, which is an important area of research in Computer Science, in the context of social media," Padgett said, in a statement. "Although the concept will work with many social media platforms, Twitter was the most accessible. Everything is out there in public domain, a giant pool of untapped data, tagged with latitude and longitude. It’s very precise and lends itself to so many uses."

It’s possible that the Tweetographer might become publicly available by year-end as a Web app and mobile app, Clifton says: "We are working on giving the graphical user interface an overhaul, migrating servers, as well as some other maintenance."

Sunday, November 13, 2011

Google -- Microsoft sues over Android because Windows Phone 7 has failed

The war of words between Google and Microsoft has heated up even further, with Google's patent counsel essentially charging that the only reason Microsoft has been going after Android phone makers for patent infringement is because Microsoft's mobile phone strategy has failed. He also warns that the patent system is broken and may dramatically slow down innovation.


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com




Tim Porter, Google's patent counsel, was interviewed by SFGate. He pulls no punches about Microsoft's motivations for suing Android manufacturers, or threatening them with suits as a way to get them to pay royalties. He says:

This is a tactic that Microsoft has used in the past, with Linux, for example. When their products stop succeeding in the marketplace, when they get marginalized, as is happening now with Android, they use the large patent portfolio they've built up to get revenue from the success of other companies' products.

Porter takes aim not only at Microsoft, but at the entire patent system, and comes close to arguing that software simply shouldn't be patentable. First he says:

You can look at the development of the software industry and see a point when (software wasn't being patented) and it was a period of intense innovation. You didn't see Microsoft's first software patent until 1988. By that time it had come out with Word, not to mention DOS.

So there's just no question you can look back and see that innovation happens without patents. It's also true that since there weren't patents, there wasn't software patent litigation.

Then when asked point-blank whether software should be patentable, he hems and haws, not quite calling for an end to software patents:

I think the question is whether the current system makes sense. During the period I talked about, software was protected by copyright and other legal protections. There are certainly arguments those are more appropriate.

Microsoft, of course, takes a very different approach, and says that the infringing Android patents cost the company money, and all it's doing is getting paid fairly for its work.

And Microsoft gets paid very well, indeed, by Android manufacturers who have signed royalty agreements with it. Goldman Sachs estimates that Microsoft will get $444 million from Android royalties for fiscal year 2012. Microsoft Executive Vice President and General Counsel Brad Smith and Corporate Vice President and Deputy General Counsel Horacio Gutierrez write in a recent blog that the Android agreements:

...ensure respect and reasonable compensation for Microsoft's inventions and patent portfolio. Equally important, they enable licensees to make use of our patented innovations on a long-term and stable basis.

Who's right here, Google or Microsoft? In this instance, I can't say that I know. But I do know that in general Google is right that the patent system is broken when it comes to software, and needs to be significantly reformed. Google's Porter points out that

The period of intense patent assertions (against things like the steam engine) resulted in decades-long periods of stagnation. Innovation only took off when the patents expired.

Tuesday, November 1, 2011

Microsoft’s Virtual TechDays on September 28 – 30 , 2011

Millions of developers: one call. The world's leading developer advertising group. Click Here!

Microsoft’s Virtual TechDays is back . The online event is scheduled to be held from September 28 to September 30 , 2011 .

This is the 12th Edition of Virtual TechDays and is an 3-day online event scheduled on 28th, 29th and 30th September, 2011 from 10.00 am to 05:45 pm Indian Standard Time .

There are various sessions for different tracks like

Developer
IT Professionals
Architect

Whats more , i could see few Windows Phone 7 sessions this time :)

Here’s are few sessions that i may attend depending on my schedule …

Developing 3D games for XBOX and Windows – XNA – by Ramaprasanna Chellamuthu, Ujjwal Kumar
Windows Phone 7 Mango for developers by Gowtham Prasad K N
Developing with MVC 3 and Code First Entity Framework Model by Harish Ranganathan
Building Windows Phone 7 apps for Windows Azure- Best Match with Cloud by Jebarson Jebamony
Build multi-Device applications using Push Notifications with Windows Azure by Saranya Sriram

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com