Computer Technology 12 - Chapter 25, 26
Which mobile OS enables developers to customize the user experience without restrictions?
Android
Which mobile operating systems requires a third-party software firewall?
Android
Users bringing personally owned mobile devices into an enterprise environment is called:
BYOD (Bring Your Own Device)
Which type of display responds to the difference in electrical potential between you and the screen?
Capacitive
Which of the following is used in mobile devices to convert analog video and sound to digital video and sound?
Digitizer
What are the steps involved in pairing a Bluetooth keyboard with a tablet?
Enable Bluetooth on the tablet; turn on the Bluetooth device; find the device with the tablets enter a PIN code or other pairing sequences
A great way to protect data on a removable media card is to....?
Encrypt it
What can a government use to determine your location at a specific time as long as you're using your mobile device?
Geotracking
A client calls and is upset that he's misplaced his iPad. The mobile device has literally thousands of client records, including business addresses, e-mail, addresses, phone numbers, and, in some cases, credit card information. What should he do first?
He should access his iCloud account and remotely wipe his iPad to erase all personal data.
Which of the following is a 15-digit number used to uniquely identify a mobile device that connects to a cellular network?
IMEI
Patty has both Gmail and a traditional (SMTP/POP3) e-mail account. She wants to consolidate the traditional account into her Gmail account. Where does she do this?
In the Gmail appp and In the traditional e-mail server's settings
Which of the following would be a legitimate reason a mobile device is running slowly?
Lack of stroage space
Joyce notices her GPS map app gives the error "GPS coordinates not available." What should she try first?
Move to a place where she can get a good GPS signal
Fred wants to play World of Warcraft on his desktop system. He logs in and then the game asks for a code that is generated by an authenticator app on his Android phone. This is an example of:
Multifactor authentication
Leonard just purchased a very expensive comic book and paid for it using the stored credit card information on his smartphone. What technology did he use to make the transaction?
NFC (Near Field Communication)
Pamela decides to add a traditional e-mail app to get her e-mail. Which of the following will she most probably need to configure the app?
Name of her IMAP server and Name of her SMTP server
Which mobile device screen technology uses no blacklight?
OLED
Jailbreaking an iPhone gives access to
The root account
What information do you need to connect an Android-based tablet to an IMAP account?
User name, passowrd, sending and receiving server addresses
You've lost your iPhone. What would you use to try to find it?
iCloud