IT110 Chapter 25

¡Supera tus tareas y exámenes ahora con Quizwiz!

A mobile device overheats for seemingly no reason. What is the most likely cause? A. Defective battery B. Auto-dimming screen C. HD video recording D. Low battery

A. Defective battery

What hidden menu might exist to help with device calibration? A. Diagnostics menu B. Device menu C. Touch menu D. Information menu

A. Diagnostics menu

Modern mobile devices use what type of battery? A. Li-Ion B. Ni-CD C. Ni-MH D. Ni-Ion

A. Li-Ion

Because mobile device hardware typically cannot be repaired or replaced by a user or field tech, mobile device troubleshooting focuses on what type of issues? A. Software B. Battery C. Memory D. Hardware

A. Software

When a mobile app is shut down, what might the user lose? A. Unsaved data B. Saved data C. Persistent data D. System settings

A. Unsaved data

Having a user logon at a certain time of day, or even within so many seconds or minutes of another event, is known as a(n) ________ factor. A. temporal B. ownership C. knowledge D. possession

A. temporal

What is the process in which an organization tracks when its employees enter or exit a predefined area? A. Geoconnecting B. Geofencing C. Geospoofing D. Geotagging

B. Geofencing

What is a last resort you can do if your device is stolen? A. Remote email B. Remote wipe C. Remote restore D. Remote update

B. Remote wipe

Generally, mobile devices do not include a(n) ________ because they do not have a lot of services listening on open ports. A. trusted source B. firewall C. application menu D. settings tab

B. firewall

What is it called when you hold a system's power button for several seconds until it turns completely off? A. Soft reset B. Force quit C. Hard reboot D. Force stop

C. Hard reboot

Why is a hard reset the most disruptive reset option? A. It frees up more internal space. B. It closes applications. C. It removes all of a user's data and settings. D. It causes battery drain.

C. It removes all of a user's data and settings.

Removing OS restrictions on an Apple device is known as ________. A. device spoofing B. rooting C. jailbreaking D. access injection

C. jailbreaking

Which term refers to a collection of configuration and security settings that an administrator has created? A. System group B. eXtensible markup C. BYOD D. Profile

D. Profile

What term describes restarting a mobile device, whether you do it from within the OS or with hardware buttons on the device? A. App reset B. Hard reset C. Reboot D. Soft reset

D. Soft reset

What might be the result of too many failed login attempts? A. System reboot B. Application notifications C. Device reconfiguration D. System lockout

D. System lockout


Conjuntos de estudio relacionados

Chapter 3 - Money Management Strategy: Financial Statements and Budgeting

View Set

combo mistake"The Roaring Twenties: Sex, Alcohol, and Jazz" and 24 others

View Set

Choosing Depreciation Methods (Chapter 10: Choosing Accounting Methods) 693-706

View Set

Skin and Eye Infections Cases and Homework

View Set

Insurance Exam Practice Exam: Questions and Answers

View Set