ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 2 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 29 Apr 2017 My Price 11.00

Comp 129 all weeks discussions, Quizzes, Course project and final exam

Comp 129 all weeks discussions, Quizzes, Course project and final exam

To Get 100% Original and Plagiarism free work order us on below link

 

Order us at: https://hwguiders.com/custom-order/

 

Email us at: homeworkguiders@gmail.com

 

Comp 129 all weeks discussions, Quizzes, Course project and final exam

 

 

Devry Comp 129 Week 1 Discussion

 

Discussion 1

 

In this discussion, we will look at the basics of both hardware and operating systems. To begin this discussion, let’s first define the difference between hardware and software. What is hardware? What is software? What are the purposes of hardware and software?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

 

Discussion 2

 

In this discussion, we will look at power supplies and form factors. What is the purpose of a power supply? What is a form factor? How do power supplies and form factors relate to one another?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

 

Devry Comp 129 Week 2 Discussion

 

Discussion 1

 

Take some time this week to open up your computer (or better yet, an old junky one), and take a look inside (be sure to unplug your machine and not to touch any of the components—look but don’t touch). Based on your readings, what kind of motherboard is being used? What form factor? How did you know?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

Discussion 2

 

What is a CPU? What is the purpose of the CPU?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

 

Devry Comp129 Week 3 Discussion

 

 

Discussion 1

 

Describe the Windows operating system. Discuss some of your favorite Windows features.

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts

 

 

Discussion 2

 

Have you ever had a problem with your Windows operating system? What happened, and what was the result?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

 

Devry Comp129 Week 4 Discussion

 

Discussion 1

 

Identify and discuss some peripherals that ordinary desktop PC users would normally use. Discuss how they work and their purposes.

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

Discussion 2

 

Discuss backup strategies and devices that you can use with your PC at home or in the workplace. How does the device connect? What standards does it use?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

 

Devry COMP129 Week 5 Discussion

 

 

Discussion 1

 

What are the basic components required to set up a network? How do you add a PC to a network?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

Discussion 2

 

What is one of your favorite applications that utilizes the Internet? Discuss what happens behind the scenes in the network that enables your PC to implement that application.

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

 

 

Devry COMP 129 Week 6 Discussion
Discussion 1

 

What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure? What are some of the basic security threats that a user or administrator might have to face?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

Discussion 2

 

What is Linux? When would you use it? How does it differ from Windows? Are there different versions of Linux?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Devry COMP 129 Week 7 Discussion



Discussion 1

 

What is troubleshooting? How can you find the cause(s) of the problem quickly when you have limited experience? Why is it important to keep a computer healthy?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.

discussion 2

 

We have studied the CLI for both Windows and Linux. The real power in using commands comes with scripting. What are some repetitive tasks you can think of that could be done more easily with a well-written script?

Avoid using the Respond button at the top of the discussion. Help keep the discussion organized by responding only to other posts.
Devry COMP 129 All Weeks quizzes



week 1

 

  1. 1. Question : (TCO 2) Why is having the correct device driver so important?

 

 

Question 2. Question : (TCO 2) What is the maximum transfer rate for a USB 2.0 port?

 

Question 3. Question : (TCO 2) What is the primary purpose of the power supply?

Question 4. Question : (TCO 2) What atmospheric condition

can increase the potential for static electricity?

Question 5. Question : (TCO 2) A _____ is required

before software from the BIOS is executed.

Question 6. Question : (TCO 2) Which unit would you recommend for the help desk people who sit at a computer for a 24/7 operation where help must be provided at all times?

Question 7. Question : (TCO 1) Refer to the provided figure. What type of cable would have this symbol?

Question 8. Question : (TCO 1) Jane decides to restart her computer by pressing the Ctrl+Alt+Delete combination keys. This procedure

is called a _____.

Question 9. Question : (TCO 1) Why is it best not to start cleaning a computer by using compressed

air?

Question 10. Question : (TCO 11) After a problem is solved, a technician must _____ findings, actions, and outcomes.

 

 

Devry Comp129 Week 2 Quiz

 

  1. 1. Question : (TCO 3) Major microprocessor manufacturers are _____.

Question 2. Question : (TCO 3) What does quad core mean in relation of processors?

Question 3. Question : (TCO 3) An engineering professor teaches CAS at the university. Which expansion slot would be best for the graphics card in the professor’s computer?

Question 4. Question : (TCO 3) Most motherboards use _____ for RAM.

Question 5. Question : (TCO 3) Double-sided memory _____.

Question 6. Question : (TCO 3) Dual channeling _____.

 

Question 7. Question : (TCO 3) Where are mini PCIe cards normally installed?

Question 8. Question : (TCO 2) Which of the following will most likely contain SO-DIMM memory?

Question 9. Question : (TCO 2) A physical problem with a memory chip will often cause a(n) _____ error.

Question 10. Question : (TCO 11) Bill and John are overloaded. They have to install more than 50 access points. Joni hears their frustration and offers to help. This is an example of _____.

 

 

Devry Comp129 Week 3 Quiz

 

  1. 1. Question : (TCO 4) Linux has a variety of _____ that provide the basic functionality that you are used to when working with an operating system, such as the cp command for copying files, the mvcommand for moving files, the vi editor for editing a text file, and so on.

 

Student Answer: DOS commands

utilities

batch files

GUI tools

Instructor Explanation: TestOut Linux+ Section 0.1.3

Points Received: 4 of 4

Comments:

 

Question 2. Question : (TCO 4) What is a home screen on a mobile device?

 

Student Answer: Where you have to be to see what applications are currently running

Where the physical volume control is normally located

Where photo files are stored

Where app icons are found

Instructor Explanation: Schmidt, Chapter 11

Points Received: 4 of 4

Comments:

 

Question 3. Question : (TCO 4) Consider the following directory structure from the C: drive root directory.

 

2014_Term (directory)

CompRepair (subdirectory)

Opsys (subdirectory)

Cisco8 (subdirectory)

VOIP (subdirectory)

If the prompt is C:2014_Term> and you wanted to move into theCisco8

subdirectory, what

command do you type?

Student Answer: CD Cisco8

CD..

CD Cisco8

CD C:Cisco8

Instructor Explanation: Schmidt, Chapter 11

Points Received: 0 of 4

Comments:

Question 4. Question : (TCO 4) List three items commonly found in a dialog box.

Student Answer: Properties, Close button, Font button

OK button,

Cancel button, Make new file button

Help button, Close button, OK button

Help button, Close button, Restart button

Instructor Explanation: Schmidt, Chapter 11

Points Received: 4 of 4

Comments:

Question 5. Question : (TCO 4) Which tool can you use to view, but not modify, hardware and configuration information for your computer?

Student Answer: The System applet in Control Panel

Msinfo32

Msconfig.exe

Event Viewer

Instructor Explanation: TestOut PC Pro Section 9

Points Received: 4 of 4

Comments:

Question 6. Question : (TCO 4) Who is given credit for the GNU initiative?

Student Answer: Richard Stallman

Bill Gates

Linus Torvald

All of the above

Instructor Explanation: TestOut Linux+ Section 0.1.3

Points Received: 4 of 4

Comments:

Question 7. Question : (TCO 4) Which user type was available

in Windows XP but is not available

for Windows Vista and 7?

Student Answer: Guest

Administrator

Standard User

Power User

Instructor Explanation: Schmidt, Chapter 12

Points Received: 4 of 4

Comments:

Question 8. Question : (TCO 4) What Windows 7 feature speeds up file searches?

Student Answer: Shadow Copy

Indexing

Sharing

ReadyBoost

Instructor Explanation: Schmidt, Chapter 12

Points Received: 4 of 4

Comments:

Question 9. Question : (TCO 4) What is the default location for 64-bit application files in Windows 7?

Student Answer: The Windows folder

The Program Files folder

The SysWOW64 folder

The System64 folder

Instructor Explanation: Schmidt, Chapter 12

Points Received: 4 of 4

Comments:

Question 10. Question : (TCO 11) Learning the next-generation features of the most recent . october#”>smartphones is an example of _____.

Student Answer: OS maintenance

staying current with technology

leveraging documentation

working out a solution

Instructor Explanation: Schmidt, Chapter 11

Points Received: 4 of 4

Comments:

* Times are displayed in (GMT-07:00) Mountain Time (US & Canada)

 

 

 

 

 

week 4

Devry CoMP129 Week 4 Quiz Latest 2015 October

  1. 1. Question : (TCO 5) A laptop normally has an _____ type of hard drive installed.

Student Answer: internal SCSI

external SCSI

external SATA

internal SATA

Instructor Explanation: Schmidt, Chapter 7

Points Received: 4 of 4

Comments:

Question 2. Question : (TCO 6) Why is backing up data to a different partition on the same hard drive not a good idea?

Student Answer: The data perform at a slower rate.

Other users who have rights to save files can retrieve the backup, install to a different computer or drive, and potentially see others’ data.

If the drive fails, both the data and the backup are potentially unusable.

The backup takes longer.

Instructor Explanation: Schmidt, Chapter 7

Points Received: 4 of 4

Comments:

Question 3. Question : (TCO 6) Which backup type would back up all the user’s data and set the archive bit for each file?

Student Answer: Comprehensive

Full

Differential

Incremental

Instructor Explanation: Schmidt, Chapter 7

Points Received: 4 of 4

Comments:

Question 4. Question : (TCO 5) Which optical medium has the greatest storage capacity?

Student Answer: Compact disc

Dual-layer, single-sided DVD

Single-layer, single-sided Blu-ray disc

Dual-layer, double-sided DVD

Instructor Explanation: TestOut PC Pro A+, Section 5.6

Points Received: 4 of 4

Comments:

Question 5. Question : (TCO 5) For internal optical drives, what is the most common type of internal interface found today?

Student Answer: SCSI

IDE

USB

Firewire

Instructor Explanation: Schmidt, Chapter 8

Points Received: 4 of 4

Comments:

Question 6. Question : (TCO 6) What term is used to describe the number of samples a sound card takes to create the reproduction of the original sound?

Student Answer: Analog-to-digital conversion rate

Power rating

Frequency response

Signal to noise ratio

Instructor Explanation: Schmidt, Chapter 8

Points Received: 4 of 4

Comments:

Question 7. Question : (TCO 5) What Android app could be used to see saved photos?

Student Answer: Settings

Gallery

Photos

Video

Instructor Explanation: Schmidt, Chapter 8

Points Received: 4 of 4

Comments:

Question 8. Question : (TCO 5) What happens when you press the Fn key along

with a function key on a laptop computer?

Student Answer: You allow the computer

to be placed in one of four power modes, which helps with video troubleshooting.

You allow the computer

to be placed in diagnostic

mode, which is especially useful when troubleshooting video problems.

You get additional features depending

on the key you press.

You refresh the monitor.

Instructor Explanation: Schmidt, Chapter 9

Points Received: 4 of 4

Comments:

Question 9. Question : (TCO 6) A user wants to expand his normal Windows 7 desktop work area across two monitors.

What would be the best solution for this user?

Student Answer: Use an integrated VGA port and a DVI port on an adapter.

Install a video card with two ports if two ports are not available on the motherboard.

Use a KVM switch.

Use a video splitter.

Instructor Explanation: Schmidt, Chapter 9

Points Received: 4 of 4

Comments:

Question 10. Question : (TCO 11) What should you do when speaking on the phone with a customer who is very upset and yelling at you?

Student Answer: Stay calm but raise your voice level a little to show the importance and professionalism of your technical question.

Ask the caller whether you can put him or her on hold while he or she calms down.

Hang up on the caller.

Speak to the customer using a calm, professional tone.

Instructor Explanation: Schmidt, Chapter 7

Points Received: 4 of 4

Comments:

 

 

 

 

Devry Comp129 Week 6 Quiz

 

  1. 1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.

Student Answer: Kerberos

Crypto IP Encapsulation (CIPE)

Internet Protocol Security (IPsec)

Secure Sockets Layer (SSL)

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.

Student Answer: ExpressCard

CardBus card

PCI card

PC Card

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 3. Question : (TCO 8) A worm _____.

Student Answer: is a program that can replicate by attaching itself to another program

can spread copies of itself throughout a network without a host program

does not need a host program to work; It pretends to be a legitimate program

is dormant code added to software and triggered by a predetermined event

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.

Student Answer: Authentication

Authorization

A background process

BIOS settings

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.

Student Answer: Russian or Chinese hackers

college students studying hacking

employees leaving passwords in full view

disgruntled employees

Instructor Explanation: Week 6 Online Lecture

Points Received: 0 of 4

Comments:

Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?

Student Answer: Buy 1/0 rewrite software.

Drill holes in the platters and smash the pieces with a hammer.

Hold a magnet over each platter.

Repartition the hard drive into multiple partitions using different file systems.

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.

Student Answer: user service

encryption

authentication

authorization

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?

Student Answer: more

pwd

dir

ls

Instructor Explanation: TestOut Linux+, Section 1.1

Points Received: 4 of 4

Comments:

Question 9. Question : (TCO 9) What is SSID broadcasting?

Student Answer: The method the access point uses to reach all wireless NICs with a single message

A means for the access point to send the wireless encryption keys to all wireless NICs for network access

The access point constantly sending the name of the wireless network into the air

The access method used for 802.11 a, b, g, and n wireless networks

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.

Student Answer: never lying.

good communications skills

a new customer discount

professionalism.

Instructor Explanation: Schmidt, Chapter 15

Points Received: 0 of 4

 

 

Devry Comp129 Week 6 Quiz

  1. 1. Question : (TCO 8) The protocols used to encrypt account names and passwords are called authentication protocols. The protocol used for Windows is _____.

Student Answer: Kerberos

Crypto IP Encapsulation (CIPE)

Internet Protocol Security (IPsec)

Secure Sockets Layer (SSL)

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 2. Question : (TCO 9) A(n) _____ is about the size of a credit card, but thicker.

Student Answer: ExpressCard

CardBus card

PCI card

PC Card

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 3. Question : (TCO 8) A worm _____.

Student Answer: is a program that can replicate by attaching itself to another program

can spread copies of itself throughout a network without a host program

does not need a host program to work; It pretends to be a legitimate program

is dormant code added to software and triggered by a predetermined event

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 4. Question : (TCO 8) _____ prove(s) that individuals are who they say they are.

Student Answer: Authentication

Authorization

A background process

BIOS settings

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 5. Question : (TCO 8) The largest security risk for stealing confidential data comes from ____.

Student Answer: Russian or Chinese hackers

college students studying hacking

employees leaving passwords in full view

disgruntled employees

Instructor Explanation: Week 6 Online Lecture

Points Received: 0 of 4

Comments:

Question 6. Question : (TCO 8) Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?

Student Answer: Buy 1/0 rewrite software.

Drill holes in the platters and smash the pieces with a hammer.

Hold a magnet over each platter.

Repartition the hard drive into multiple partitions using different file systems.

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 7. Question : (TCO 8) The protocols used to encrypt account names and passwords are called _____ protocols.

Student Answer: user service

encryption

authentication

authorization

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 8. Question : (TCO 4) Which Linux command shows you what the current directory is?

Student Answer: more

pwd

dir

ls

Instructor Explanation: TestOut Linux+, Section 1.1

Points Received: 4 of 4

Comments:

Question 9. Question : (TCO 9) What is SSID broadcasting?

Student Answer: The method the access point uses to reach all wireless NICs with a single message

A means for the access point to send the wireless encryption keys to all wireless NICs for network access

The access point constantly sending the name of the wireless network into the air

The access method used for 802.11 a, b, g, and n wireless networks

Instructor Explanation: Schmidt, Chapter 15

Points Received: 4 of 4

Comments:

Question 10. Question : (TCO 11) Trust between you and your customer begins with _____.

Student Answer: never lying.

good communications skills

a new customer discount

professionalism.

Instructor Explanation: Schmidt, Chapter 15

Points Received: 0 of 4

Comments:

 

 

week 7

 

(TCO 4) You have been asked to temporarily fill in for a Linux administrator who has just been fired. This administrator was known to take a lax view of security and it is suspected that passwords are still kept in the /etc/passwd file. When viewing that file, which entry below would indicate that the passwords are there?

kolson:85yxir:430:0:Back Door:/root:/bin/bash

badams:x:341:52:Brent Adams:/users/badams:/bin/bash

dclifford:x:689:306:non secure user:/root:

tmurphy:x:100:100:/users/tmurphy:/bin/bash

Question 2. Question :

(TCO 11) Mitch Miller wants to use his optical drive to play a Moody Blues CD. When he inserts the disc and closes the drive tray, the drive turns, but he does not hear any music. What type of problem would a technician say this is?

The technician would say that it is a hardware problem.

The technician would say that it is a software problem.

The technician would say that it is an error of the user.

The technician would not be able to draw a conclusion from the description given.

Question 3. Question :

(TCO 10) In which troubleshooting step do you complete a help-desk ticket by typing the solution and closing the ticket?

Document findings, actions, and outcomes.

Identify the problem.

Verify full system functionality and, if applicable, implement preventive measures.

Establish a plan of action to resolve the problem and implement the solution.

Question 4. Question :

(TCO 10) The audio beeps heard during the boot process are caused by the _____.

RAM

processor

CMOS

BIOS

Question 5. Question :

(TCO 10) Hardware errors are often obvious _____.

during POST

during printing

when saving a file

during RAM access

Question 6. Question :

(TCO 10) What component is most likely to be included in an audio and video editing PC design?

RAID

Powerful GPU

Multiple processors

Video capture card

Question 7. Question :

(TCO 10) Which of the following would most likely be a design consideration for a gaming PC rather than a computer used for virtualization?

NAS

High amount of RAM

Multiple fast, large-capacity hard drives

Additional system cooling

Question 8. Question :

(TCO 10) Debbie keeps getting an error each time she tries to save her worksheet in AJAX ABC accounting software to the thumb drive. She then saves an Excel spreadsheet she was working on to the thumb drive and it too produces the error. A good next step would be to _____.

save the file to a different drive.

open the computer case to see whether the thumb drive is connected properly.

replace the hard drive.

Question 9. Question :

(TCO 10) Which statement is true regarding mobile design?

. Netbooks are low cost and lightweight.

Netbooks are typically lighter than tablets.

Laptops usually have less storage capability than tablets or smartphones.

Question 10. Question :

(TCO 10) An internal keyboard is generally connected to the laptop’s system board using a _____.

USB connector

ribbon cable

PS/2 port

mini-molex connector

 

 

Course Project: Due in Week 7 (Begin in Week 1)

 

Objectives

 

.equella.ecollege.com/file/fe25679a-cc25-4079-a28b-289fa1484619/19/COMP129_CH_CourseProject.html#top”>Back to Top

 

 

BUILDING A PERFECT PC!

 

 

The COMP129 project is designed to help you apply what you are learning each week using current hardware and software options to build a PC that meets a specific purpose. Although your Final Project is due in Week 7, you will begin working in Week 1 and continue adding components to your computer in each week of the class. Start by selecting the purpose of your computer and a budget. Then you can work each week to select components for your PC based on what you are learning in your class activities. Download the project deliverable template and create a spreadsheet in Week 1. (Remember, you will be turning in these two files in Week 7.) Build on these during the term as you work on building your perfect PC.

 

 

Guidelines

 

 

 

Plan to build your perfect PC. (Remember, you are to select each part of the computer. No kits are allowed. No prebuilt computing devices are allowed. This project is designed to help you apply what you are learning each week using current hardware and software options.) Use the lab project template to turn in your project questions. Attach an Excel spreadsheet that includes the major components, specifications, parts, vendors, pricing, and total cost as outlined below. (You can add additional rows and columns to the Excel template if you want to add more than the minimum in your completed computer build).

  1. Plan the purpose of your computer. (Remember, Chapter 10 in your textbook will give you some ideas on what you might select as a purpose.)
  2. Preplan a price range and try to stick to it. (Were you able to stick to your budget? Why or why not?)
  3. List all major components in your spreadsheet template. (Include at least the motherboard, processor power, memory, drives, and monitor size. Add to this list as needed).
  4. Determine all necessary parts to buy. (Include at least the case, expansion cards, NIC, and keyboard. Add to this list as needed.)
  5. Include OS and software.
  6. Update an Excel spreadsheet with all specifications and parts.
  7. Price parts from two locations. You may use brick-and-mortar stores in your area, such as TigerDirect, and online sellers, such as.newegg.com/”>newegg.comor.tigerdirect.com/”>http://www.tigerdirect.com/. You can do all of your .comparison shopping online, if you desire. (You will be adding in the prices from these two locations as separate columns in your spreadsheet. See Item 8 below.)
  8. Update your spreadsheet with the seller’s name, prices, and totals. (Make sure you add the vendor, price, and total for all the items you select, as well as the total for the computer as a whole.)
  9. Write a 4–5-paragraph report on your learning and experiences in completing this project. Make sure to include an introduction, two to three paragraphs about the project, and a conclusion for full credit on this part of the assignment. Remember, this portion of the project is worth 10 points, so make sure you are thorough and complete in your essay.

Answers

(11)
Status NEW Posted 29 Apr 2017 06:04 AM My Price 11.00

-----------

Not Rated(0)