Sunteți pe pagina 1din 82

QUESTION NUMBER

10

11

12

13

14

15

16

18

19

20

21

22

23

24

25

27

28

29

30

31

32

33

34

35

36

37

38

QUESTION

Public places that provide free wireless internet access are called: A. Infrared B. Bluetooth C. Internet Service Provider D. Wi Fi Hotspot

In schools computers from the staffroom, lab and library are all connected. Identify the netwo A. Local Area Network B. Wide Area Network C. Metropolitan Area Network D. Stand Alone Network

If TSTT wishes to provide an internet service with unbeatable speed, which medium should it A. Coaxial B. Fibre optics C.Twisted pairs D. Wireless

A WAN can be best described as: A. Connecting Systems over a large local area B. Interconnecting computers and computer-equipment over a large geographical area C. Real-time access to files D. A wireless connection

Which type of network is commonly used in most Secondary schools? A. LAN B. PAN C. MAN D. WAN

Which communication channel consists of thin hair-like strands of glass capable of transmitti beams of light, which when bundled together in a cable 0.12 inch thick, supplies one quarter million voice communications at the same time? A) Unshielded twisted pair B) Shielded twisted pair C) Coaxial cable D) Fibre optic cable

John and his friends went to their favorite restaurant to have some pizza after school one da realized that he was able to access the internet using his wireless card on his laptop and his their i-pods. The restaurant can be considered to be a A. Metropolitan area network B. Hotspot C. Local area network D. Satellite Before a computer can be connected to a network, all of the following is necessary except A) Network interface card B) Cabling C) Networking software D) Bluetooth

Identify one method that allows photos to be sent online from one's computer to another. A Posting B Download C E-mailing D Upload

Which network topology transmitts signals in ONLY one direction? A. Star B. Token Ring C. Bus D. Wireless

Which is NOT true about FTP? a) FTP is an acronym for File Transfer Portal b) Is used to download a file from a server using the internet

c) Is used to upload a file to a server using the Internet d) Stands for File Transfer Protocol Which one of the following is a web browser? A. Facebook B. Google Docs C. Mozilla Firefox D. Yahoo! Chrome

Choose the correct format for a website address. A. http://tstt.net.tt B. http://www.tstt.net.tt C. www://http.tstt.net.tt D. http://www.tstt.tt.net

Select the search engine from the following list: A. Google B. Firefox C. Internet Explorer D. Windows Messenger The M in HTML stands for: A) Markup B) Marker C) Marginal D) Marks

Which term refers to a set of rules that govern the transmission of files across the internet: A. FTP B. HTML C. HTTP D. URL

A method for transferring files between computers on a network: (A)FTP (B)VoIP

(C)HTML (D)Telnet

Which of the following is not a web browser: (A)Google Chrome (B)Opera (C)Mozilla Firefox (D)Snow Leopard The "techcombat@tstt.net.tt" is an example of a/an A. e-mail address B. URL C. website D. home page

Twitter is best described as ? A. A Social Networking site B. A Video website C. An Email account D. None of the above

What is the domain name of the URL : http://www.tstt.co.tt ? A. http B. www.tstt.co.tt C. tstt D. co.tt

What ia a home page? A. A website B. Any page of a website C. The first page when you open a browser D. A page full of homes

Which of the following can be sent or received using electronic mail? A. Money B. MP3 files

C. Packages D. Letters

Darius works as a data security analyst for a company that develops drugs. One month before the co drug was launched, a generic drug was introduced by their competitor. The computer related crime t committed to allow the competitor access to the information needed to produce this generic drug is:
A. Computer Surveillance B. Electronic Eavesdropping C. Industrial Espionage D. All of the Above

Select the browser from the following list. A. Hotbot B. Internet explorer C. Facebook D. Yahoo

The tapping into a communication channel to retrieve information is called: A. Electronic eavesdropping B. Industrial espionage C. Surveillance D. Piracy

Which of the following actions is considered to be a computer crime? A. Setting fire to a computer laboratory B. Logging C. Hacking D. Encrypting

In a networking server environment what happens If your server fails ?

A. Users unable to logon/Clients unable to communicate

B. Users logon locally /Clients communicate C. User and client can logon D. Clients able to logon/users unable to logon

All of the following can be completed using Internet banking except A. Paying credit card bill B. Check account balance C. Electronic Funds Transfer D. Withdrawing funds from your account

Which of the following can be classified as Electronic Fund Transfer? A. Paying cash for cell phone B. Obtaining discount for video game C. Buying a converse sneakers using cash D. Buying a converse sneakers using credit card

A student wants to get information on Carnival Characters in T&T. His initial search returned 100,000 hits. To improve the sea following key words will you use. A. Carnival characters B. Carnival characters in T&T C. "Carnival characters in T&T" D. "Carnival characters" in T&T

Teleconferencing and Telemarketing are commonly used in today's society. State one advantage of both teleconferencing an A. Save time and travel cost B. Less distraction of co-workers C. Shopping is easy and convenient D. Transactions are processed quickly and easily

What are CADD, CAE and CAM? A. Professional web design software B. Games C. Engineering software D. Music production software

Which Professional would typically use a graphics tablet? A.Accountant B.Legal Secretary C.Photographer D.Author

Which of the following is NOT a compiler: A. Cobol B. DDX C. Fortran D. Pascal

CATEGORY Internet Technologies

CURRICULUM OBJECTIVE

TAXONOMY LEVEL

4.1

Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Algorithmic Thinking

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Algorithmic Thinking

Internet Technologies

4.1

Algorithmic Thinking

Internet Technologies

4.1

Algorithmic Thinking

Internet Technologies

4.1

Knowledge

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.5

Problem Solving

Internet Technologies

4.5

Knowledge

Internet Technologies

4.5

Knowledge

Internet Technologies

4.5

Knowledge

Internet Technologies

4.6

Knowledge

Internet Technologies

4.6

Algorithmic Thinking

Internet Technologies

4.6

Algorithmic Thinking

Internet Technologies

4.6

Problem Solving

Internet Technologies

4.7

Problem Solving

Internet Technologies

4.7

Knowledge

Internet Technologies

4.9

Knowledge

Internet Technologies (Glossary) Knowledge (Examples not mentioned in the syllabus but they are taught to students Pg 71- K. Skeete)

STIMULUS

ANSWER

D. Wi Fi Hotspot

A. LAN

Thinking

B. Fibre optics

B. Interconnecting computers and computer-equipment over a large geographical area

A. LAN

D) Fibre optic cable

B. Hotspot

D) Bluetooth

D Upload

B. Token Ring

FTP is an acronym for File Transfer Portal

C. Mozilla Firefox

B. http://www.tstt.net.tt

A. Google

A Markup

A. FTP

(A)FTP

(D) Snow Leopard

A. e-mail address

A. A Social Networking site

B. www.tstt.co.tt

C. The first page when you open a browser

B. MP3 files

D. All of the Above

B. Internet explorer

A. Electronic eavesdropping

C. Hacking

A. Users unable to logon/Clients unable to communicate

D. Withdrawing funds from your account

D. Buying a converse sneakers using credit card

C. "Carnival characters in T&T"

A. Save time and travel cost

C. Engineering software

C.

Photographer

B. DDX

Pg 71- K. Skeete)

QUESTION NUMBER
1

10

11

12 13 14

15

16 17 18 19

20

21 22 23 24

25 26

27 28

29

32 33

34

35

36 37

QUESTION Light is to Fibre-optics what electromagnetic waves is to wireless communication A modem carries data communications from one place to another in a network It is possible for modern Bluetooth devices to have more than one simultaneous point-to-point connection. There are three types of area networks Bluetooth is a type of wireless network. LAN is a network that covers a wide geographical area. Bandwidth does not have a direct impact on the amount of data that can be transmitted. A LAN is considered as a network in the same building only. Simplex data transmission is from receiver to sender. A hotspot is where Internet becomes readily available. To gain access to the Internet you need a local ISP. The Internet is owned by large organisations. The Internet is a network of networks The appropriate domain name for a government website is ".gov". Movies and sounds can be inserted into power point slides.

Another name for a seach engine is a web portal. The Web is another name for the Internet The internet protocol address is a 32 bit address. Electronic Mail and Internet Relay Chat allows users to attach files. Electronic mail allows messages to be stored. Videos can be embedded on web pages. Web pages are usually encoded in a special language called Hypertext Makeup Language. Email is used for the sending and receiving of parcels. URL stands for United Resource Location. Attachments can be used to attach files to an email message. Microsoft Internet Explorer is not a browser. .org represents government bodies Every computer on a network has its own IP address. Working from home and communicating with office via the internet is called Telecommuting Data integrity is the same as data security Expert Medical Systems is an AI system that helps doctors answer questions in the field of medicine. Robotics is not a form of artificial Intelligence. Banking transactions cannot be completed online.

A website is a single document that can be viewed on the Web A web page can be created using a simple text editor

CATEGORY Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies

CURRICULUM OBJECTIVE 4.1 4.1 4.1 4.1 4.1 4.1 4.1 4.1 4.1 4.1 4.2 4.2 4.2 4.3 4.3

TAXONOMY LEVEL ANSWER Algorithmic Thinking Knowledge Knowledge Knowledge Knowledge Knowledge Algorithmic Thinking Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge TRUE FALSE

STIMULUS

TRUE TRUE LAN, MAN, WAN TRUE FALSE

FALSE FALSE FALSE TRUE TRUE FALSE

TRUE TRUE TRUE

Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies Internet Technologies

4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.3 4.4 4.7 4.7 4.8

Knowledge Knowledge Knowledge Algorithmic Thinking Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Knowledge Algorithmic Thinking Knowledge Algorithmic Thinking

TRUE FALSE TRUE TRUE TRUE TRUE FALSE FALSE FALSE TRUE FALSE TRUE TRUE TRUE FALSE TRUE FALSE FALSE

Internet Technologies Internet Technologies

6.25 6.25

Knowledge Knowledge

FALSE TRUE

QUESTION NUMBER
1

2 3 4 5

6 7

8 9 10

11

12

13 14

15

16 17 18 19

20

21

22

23

24

26 27

28

29

30 31 32

33

34

35 36

37

38 39

40

41

42 43 44

45

46

47

48

49

50

51

52

53

54

55 56

57

58

59

60 61

62

63

64

65

66

67

68

69

70 71 72 73

75

76

77

78

80

QUESTION It meaures the capactity of a communications channel A radio technology similar to Wi-Fi but only works over short distances This technolgy is used in remote controls for televisions Cables and signals together are known as Name the device that allows you to connect to the internet. Students have access to a number of music storage devices such as MP3, MP4, iPod players which are small and portable. Name storage media used to save the music files. What does the acronmy MAN means?

What is the function of a modem? There are three types of LAN topologies. Name one. What type of processing would an Airline Agency use when booking flights? TSTT can provide internet connection where there is no physical phone line via their Blink Broadband subscription. What device must be plugged into your computer to have access to this service? What is the network topology where each node (network device) has its own connection to the hub? Data transmitted in both directions but not at the same time is known as What is "Full Duplex" transmission? Two security guards conversing over walkie-talkie is an example of what type of communication mode?

What is the meaning of Simplex? What is the purpose of a modem? What is point -to -point transmission? What type of transmission media does Wi-Fi use? Name the transmission media that carries electric current at radio frequencies? Name the transmission media carrying data using strands of glass and light. The data transmission method used by TSTT Blink technology

Identify the data transmission media seen here in the photograph.

What does the acronym "MODEM" stand for

Give one disadvantage of the Internet. An extension to an intranet is known as Mary ordered a phone online. She received the phone two weeks after the order. Why is this classified as an ecommerce activity? A method for distributing audio files that was first developed to support the Apple i-pod A communication service used to chat with others by keying in messages to one another and both your messages and replies can be seen on screen. What do the acronym HTTP stand for? What do the acronyms URL stand for? In the video the term Electronic eavesdropping was mentioned.What is electronic eavesdropping? (Website location for video used is www.tscmvideo.com, see from time 1:18-2:00 ) To convert your mobile phone into an electronic eavesdropping device, modifications has to be made to the phone. Justify why software modifications are made. John was caught with the two mobile phones shown in the video. He was charged with electronic eavesdropping. Discuss reason for the charge. What ia a fire-proof cabinet

Define the term File Transfer Protocol?

What is electronic commerce? Name the protocol that most URL addresses use.

This website allows a user to create a blog. What is blog short for?

What is the URL in the web browser shown in the picture?

What do the following acronym stand for www? What do the following acronyms stand for XHTML? What is a webpage? What type of technology does Online chatting with Text, Voice and Video, such as iChat or Skype uses?

A URL is broken down into three (3) parts by a web browser, what are these parts? A protocol allowing you to have voice communication through the Internet.

Name one measure that a person can implement to prevent Darius works as a data security analyst for a company that unauthorised access to his wirelessthe company's new drug develops drugs. One month before internet connection. was launched, a generic drug was introduced by their competitor. State one preventative measure Darius should have taken to prevent the competitor from gaining the information to produce the generic drug.

Securing data by encoding it with a special key is called?

Name one type of computer virus.

The type of data security represented in the picture shown.

The most common method of protecting data

The pictures below illustrates a technology used to protect data. Identify the technology.

Mary ordered a phone online. She was contacted within 24 hours to verify the order. State one reason why the company would asks Mary to verify the order. What Information Technology application is best suited for accessing cash from your bank account 24 hours a day?

What Information Technology application is best suited for shopping from your home?

Identity Theft is becoming prevalent in today's society. What is identity theft? (Website location for video used is " www.youtube.com/watch?v=YWnUmpQhiOw" see from time 0 to 14sec.) What TWO measures can be taken to prevent identity theft? (Website location for video used is " www.youtube.com/watch?v=YWnUmpQhiOw" see from time 0 to 14sec.)

Discuss one implication of Identity Theft. (Website location for video used is " www.youtube.com/watch? v=YWnUmpQhiOw" see from time 0 to 14sec.) A form of fraud where criminals pretend to be someone else is called? The type of computer crime where an employee is a spy to find out all the confidential marketing information of the company.

What computer crime can be committed by the misuse of the information downloaded?

Teleconferencing and Telemarketing are commonly used in today's society. State two hardware requirements that are common to both. List One benefit of the wireless technology shown in the video for a visually impaired or blind person. (Website location for video used is " www.youtube.com/watch? v=RxgcqgsU8ks" see from time 0 to 34sec.)

List two ways how this technology can improve the lifestyle of a visually impaired or blind person. (Website location for video used is " www.youtube.com/watch?v=RxgcqgsU8ks" see from time 0 to 34sec.)

Identify the technology used in the video. (Website location for video used is " www.dvice.com/archives/2010/04/laundry-folding.php" see from time 5 to 33sec.)

Identify an industry where this technology can be used, and justify why it is used there. (Website location for video used is " www.dvice.com/archives/2010/04/laundry-folding.php" see from time 5 to 33sec.) Describe two practical applications of this technology for physically impaired persons. (Website location for video used is " www.dvice.com/archives/2010/04/laundryfolding.php" see from time 5 to 33sec.)

Why do you think Robots are a preferred choice for employers? The computer applications acronym CADD stands for? The computer applications acronym CAE stands for? The computer applications acronym CAM stands for?

The video shows robots employing what type of software?

A company is thinking about implementing telecommuting in its company. Justify the need for telecommuting. A company is thinking about implementing telecommuting in its company. Name two hardware devices required for telecommuting. Employees working from home using a computer to connect and communicate with their companys computer is called?

A file _______ handles all the shared files and data.

CATEGORY Internet Technologies

CURRICULUM OBJECTIVE 4.1 4.1 4.1 4.1 4.1

TAXONOMY LEVEL Knowledge Knowledge Algorithmic Thinking Knowledge Knowledge

Internet Technologies Internet Technologies Internet Technologies Internet Technologies

Algorithmic Thinking Internet Technologies Internet Technologies 4.1 4.1 Knowledge

Internet Technologies Internet Technologies Internet Technologies

5.1 4.1 4.1

Knowledge Knowledge Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies Internet Technologies

4.1 4.1

Knowledge Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies Internet Technologies Internet Technologies Internet Technologies

4.1 4.1 4.1 4.1

Knowledge Knowledge Knowledge Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Knowledge

Internet Technologies

4.1

Algorithmic Thinking

Internet Technologies

4.1

Problem Solving

Internet Technologies

4.1

Knowledge

4.2 Internet Technologies Internet Technologies 4.2

Knowledge

Knowledge Algorithmic Thinking

Internet Technologies

4.3

Internet Technologies

4.3

Knowledge

Internet Technologies Internet Technologies Internet Technologies

4.3 4.3 4.3

Knowledge Knowledge Knowledge

Internet Technologies

4.3

Knowledge

Algorithmic Thinking Internet Technologies 4.3

Internet Technologies Internet Technologies

4.3 4.3

Problem Solving Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies Internet Technologies

4.3 4.3

Knowledge Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies Internet Technologies Internet Technologies

4.3 4.3 4.3

Knowledge Knowledge Knowledge

Internet Technologies

4.3

Knowledge

Internet Technologies

4.3

Algorithmic Thinking

Internet Technologies

4.3

Knowledge

Internet Technologies

4.4

Knowledge

Internet Technologies

4.4

Algorithmic Thinking

Internet Technologies

4.4

Knowledge

Internet Technologies

4.4

Knowledge

Internet Technologies

4.4

Knowledge

Internet Technologies

4.4

Algorithmic Thinking

Internet Technologies

4.4

Algorithmic Thinking

Internet Technologies Internet Technologies

4.5 4.5

Algorithmic Thinking Knowledge

Internet Technologies

4.5

Knowledge

Internet Technologies

4.5

Knowledge

Internet Technologies

4.5

Knowledge

Internet Technologies Internet Technologies

4.5 4.5

Algorithmic Thinking Knowledge

Internet Technologies

4.5

Knowledge

Internet Technologies

4.5

Algorithmic Thinking

Internet Technologies

4.7

Algorithmic Thinking

Internet Technologies

4.7

Algorithmic Thinking

Internet Technologies

4.7

Algorithmic Thinking

Internet Technologies

4.7

Knowledge

Internet Technologies

4.7

Algorithmic Thinking

Internet Technologies

4.7

Problem Solving

Internet Technologies Internet Technologies Internet Technologies Internet Technologies

4.7 4.7 4.7 4.7

Algorithmic Thinking Knowledge Knowledge Knowledge

Internet Technologies

4.7

Analytical Thinking

Internet Technologies

4.8

Problem Solving

Internet Technologies

4.8

Algorithmic Thinking Knowledge

Internet Technologies

4.8

Internet Technologies

Knowledge

ANSWER Bandwidth Bluetooth Infrared Transmission media Modem

Use either flash memory or small hard drives to store hundreds and thousands of songs Metropolitan area network. A device that converts analogue signals to digital signals and digital signals back to analogue signals. Star Topology; ring topology; line or bus topology. Real-time Processing

a Wi Fi Modem

Star network

Half-duplex Data transmission in both directions at the same time.

Half Duplex

Data that can be sent or received datanot doa computer into It is a device that converts digital but from both. analogue form that can be passed along a telephone wire and vice versa. Is the process by which data is sent from one location to another. Wireless transmission media

Coaxial Cable

Fibre-optic Cables

Broadband

Fibre-optic

Modulator/Demodulator

There is an availability of a lot of inaccurate information; It may be difficult to exactly what you need because of the volume of information available; Computer viruses can be easily downloaded. Extranet

Mary is buying merchandise/item over the internet Pod-casting

Instant Messaging

HyperText Transfer Protocol Uniform Resource Locator

Electronic Eavesdropping is gaining unauthorised access to data being transmitted by tapping data transmission channels. Software modifications must be made because the phone has to be programmed to receive a call from a specific number that allows it to go into eavesdropping mode.

John was charged with electronic eavesdropping because he was gaining access to information illegally. A physical restriction used to secure on-site back-ups of data . A set of rules that govern the sending and receiving of files on the internet. The buying, selling, marketing and servicing of products and services over computer network. http-Hyper Text Transfer Protocol

Web log

http://www.google.tt/

World Wide Web Extensible Hypertext Markup Language A collection of text and multimedia documents. Voice Over Internet Protocol(VOIP)

i. Protocol; ii. Domain server name; iii. File name

VOIP (Voice Over Internet Protocol)

Using a password Use passwords/biometric scans to access computer storing formula files, distribute sensitive work among multiple workers, encrypt formula files.

Encryption

File virus; Email virus; Trojan horses; Boot-sector virus.

Physical/fireproof vault or cabinet

Passwords

Biometric Systems Technology

The company wants to ensure that Mary placed the original order. ATM card/debit card

E-commerce

Identity theft is stealing someone's personal information without their permission or knowledge to commit fraud and other crimes for financial gain. Measures that can be taken to prevent identity theft are don't give out your personal information eg, password and pin number relating to your bank and credit card accounts, don't give out personal identification nos, such as driver's permit no and passport number.

Identity is stolen and persons can gain access to your financial accounts, use your data for illegal purposes, you can become an invisible person who ceases to exist Identity theft

Industrial espionage

Credit card fraud or Computer fraud or fraud

Computer, modem, telephone

Benefits of this technology are: it audibly identifies streets, buildings and businesses for them as they walk along the streets. It makes them more independent because they don't have to ask for directions when walking, gives them confidence when travelling in vehicles because it tells you your location as the vehicle moves along,thus giving them a greater sense of security.

Robotics is the use of computer controlled machines in place of humans to perform repetitive and dangerous tasks.

Can be used in the following industries automotive, space exploration, in biochemical plants and in scientific studies. Reason to perform repetitive and dangerous tasks

It can assist them with a number of household chores, aid with safety,enable them to be more independent by improving their mobility and communication. They are preferred because Robots don't get sick, complain, take strike action, get tired, perform with fewer errors than humans, can operate in extreme environments, can perform high precision tasks. Computer Aided Design and Drafting Computer Aided Engineering Computer Aided Manufacturing

CADD, CAM Reduces time and cost of commuting; Improve health by reducing stress; Improves productivity; better organistion of personal time, promotes safety

Computer, modem, web cam, headphones, microphone, scanner/fax machine

Telecommuting

Server

STIMULUS

http://www.techdigest.tv/Fibre-OpticCable.jpg

Electronic eavesdropping video

Electronic eavesdropping video

Electronic eavesdropping video

Screen Shot

Picture

Picture

Picture

Identity Theft Video (Website location for video used is " www.youtube.com/watch? v=YWnUmpQhiOw" see from time 0 to 14sec.) Identity Theft Video (Website location for video used is " www.youtube.com/watch? v=YWnUmpQhiOw" see from time 0 to 14sec.) Identity Theft Video (Website location for video used is " www.youtube.com/watch? v=YWnUmpQhiOw" see from time 0 to 14sec.)

Cartoon

Wireless Device for Blind person video(Website location for video used is " www.youtube.com/watch? v=RxgcqgsU8ks" see from time (0 to 34sec.) Wireless Device for Blind person video(Website location for video used is " www.youtube.com/watch? v=RxgcqgsU8ks" see from time (0 to 34sec.) Robot folding clothes video(Website location for video used is " www.dvice.com/archives/2010/04/laun dry-folding.php" see from time 5 to 33sec.)

Robot folding clothes video(Website location for video used is " www.dvice.com/archives/2010/04/laun dry-folding.php" see from time 5 to 33sec.) Robot folding clothes video(Website location for video used is " www.dvice.com/archives/2010/04/laun dry-folding.php" see from time 5 to 33sec.) Robot folding clothes video(Website location for video used is " www.dvice.com/archives/2010/04/laun dry-folding.php" see from time 5 to 33sec.)

http://www.youtube.com/watch?v=adSYMbPw_oM

S-ar putea să vă placă și