Mobile Devices Quiz 2 CompTIA A+ 1101

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following form factors of storage devices are NOT used in laptops? • 1.8" • 2.5" • 3.5" • M.2

3.5" OBJ-1.1: A 3.5" drive is only used in desktops and some networked file servers. The larger 3.5" magnetic drives are the standard size used by desktop computers and do not fit into a laptop's smaller form factor. Laptops most commonly use 2.5" and 1.8" magnetic drives. In modern laptops, you will often find an M.2 form factor SSD installed.

You are working for a logistics company that needs to get a device that will automatically enter information about a package when it is read using light and a lens. Which of the following devices should you install to BEST support this requirement? • Touch screen • Webcam • Digitizer • Barcode reader

Barcode reader OBJ-1.3: A barcode scanner or barcode reader is a handheld or pen-shaped device designed to scan barcodes. A barcode is a pattern of different sized parallel bars, typically representing a product number, such as an ISBN, EAN, or UPC. The reader uses a sensor mechanism (typically either a photodiode, laser, or CCD) to read the intensity of light reflected by the barcode. The reader then reports the number back to application software, which links it to a product database. A webcam is a video camera that feeds or streams an image or video in real-time to or through a computer to a computer network, such as the Internet. Webcams are typically small cameras that sit on a desk, attach to a user's monitor, or are built into a laptop, desktop, or mobile device. The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer can be touched and inspected without taking apart the device. A touch screen display provides the capability to use tactic actions to send input to a computer by interacting directly with the elements on the display using the person's fingers.

Which of the following technologies is often used indoors by companies to locate a shopper's position in a store and provide them time-sensitive offers or discounts? • GPS • Bluetooth • Wi-Fi • Cellular

Bluetooth OBJ-1.4: A mobile device can use its internal GPS, cellular, Bluetooth, or Wi-Fi radios to identify its location. When indoors, the devices can use either Bluetooth or Wi-Fi to determine their location. Bluetooth can be used within a building to provide an accurate of the device within 3-4 meters. Bluetooth location services are often used to identify where in a store a customer is located and present them with targeted offers. For example, if the store identified that you were in the frozen foods section, they might send you a push notification offering you a discount on a pint of ice cream. Wi-Fi positioning systems use the signal strength or angle of arrival of a signal to determine the device's location within 1-4 meters. The use of Bluetooth and Wi-Fi to determine the device's location is known as an internal positioning system (IPS). Cellular radios can provide an approximate location based upon the triangulation of your position between different cellular towers. A GPS (global positioning system) device is used to determine a receiver's position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). The device's GPS receiver can provide an accurate location up to 10 meters.

An employee at Dion Training complains that every time airplane mode is enabled on their laptop, their external mouse and headphones stop working. Which of the following technologies is being disabled by airplane mode and likely causing the issues experienced by this user? • Cellular • Bluetooth • Wireless • GPS

Bluetooth OBJ-1.4: Bluetooth is a wireless connectivity method that is usually used by external mice and wireless headphones. When airplane mode is enabled, the GPS, cellular, wireless, and Bluetooth radios are usually disabled in smartphones, tablets, or laptops. If the Bluetooth radio is turned off/disabled, it will cause issues with Bluetooth-connected devices like mice and headphones. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. A GPS (global positioning system) device is used to determine a receiver's position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). A cellular radio is a component in a mobile device capable of switching frequencies automatically when moving between network cells without losing the connection. Wi-Fi is the IEEE 802.11 standard for wireless networking based on spread spectrum radio transmission in the 2.4 GHz and 5 GHz bands. The standard has six main iterations (a, b, g, n, ac, and ax), describing different modulation techniques, supported distances, and data rates.

Which of the following parts is responsible for converting the analog signals created by your tapping or swiping the surface of a display to a binary signal that is understood by the underlying software? • Capacitor • Backlight • Inverter • Digitizer

Digitizer OBJ-1.2: The digitizer is a touch-sensitive glass panel covering the LCD in a touchscreen assembly. The digitizer is used to convert touch events to digital signals that can be interpreted as different types of input. The digitizer can be touched and inspected without taking apart the device. Analog signals are created when you tap or swipe the surface of the display. The digitizer is connected to the laptop with a flexible digitizer cable. A grid of sensors is activated when you tap or swipe the screen. The sensors' information is sent through the digitizer cable to a circuit that converts the analog signal to a digital signal using binary. A backlight is a fluorescent lamp used to illuminate the image on a flat panel (LCD) screen. If the backlight or inverter fails, the screen image will go very, very dark. The inverter (also known as inverter board, screen inverter, or LCD inverter) is a part of the laptop's display assembly. The inverter is a small green board attached to the base of the LCD panel. In a laptop computer, the LCD screen relies on a backlight source to uniformly light up the screen, and the inverter acts as the power supply for this lighting source. If the inverter is faulty, the display will be too dim to easily see without an external light source like a flashlight. A capacitor is an electrical component that stores electrical energy and is often used to regulate voltages. It can hold a charge after the power is removed

Which of the following devices should you purchase for a child if you want them to be able to read books and magazines, but you do not want them to be able to surf the web or play games? • Smartphone • E-reader • Tablet • Laptop

E-reader OBJ-1.2: An e-Reader is a tablet-sized device designed for reading rather than general-purpose computing. For example, the Amazon Paperwhite is an example of a traditional e-Reader. Unlike a tablet, an e-reader is designed for the sole purpose of reading digital books and magazines (with perhaps the option to add annotations). E-readers use electrophoretic ink (e-ink) technology to create an Electronic Paper Display (EPD). Compared to the LED or OLED display used on a tablet, an EPD has low power consumption but facilitates high contrast reading in various ambient light conditions. These screens do not need to use a backlight in typical conditions, saving power and extending battery life.

An employee at Dion Consulting is configuring their Android smartphone to synchronize their email with their corporate Office 365 account. What type of credentials will the employee need? • Domain Name • Email and Password • Mail Protocols • Authentication code

Email and Password OBJ-1.4: To configure the email client on an Android device with an Office 365 account, the employee will need their email and password. Since Office 365 is a mainstream service, it is well supported on both Android and iPhone smartphones. If your company is running its own email servers, though, then you would be required to enter the domain name, appropriate mail protocols, and authentication codes.

Which of the following types of hard drives would be used in a gaming laptop to increase the system's boot-up performance while providing a large amount of storage at a lower overall cost? • SSD • Optical drive • Magnetic drive • Hybrid drive

Hybrid drive OBJ-1.1: A hybrid hard drive (SSHD) is a storage drive that combines the large storage capacity of an HDD with the faster read/write speed of an SSD. The majority of the drive uses a spinning disk and actuator arm, like a traditional magnetic drive, but it also contains a small SSD (solid-state drive) as part of the combined hybrid drive unit. This allows data to be written to either the SSD portion (for data accessed more frequently like the OS and programs) while using the HDD portion to store larger amounts of rarely accessed files (such as photos and video files). Hybrid hard drives constantly monitor the data retrieved from storage, and it automatically determines which data you open the most. It places the files that you use most often on the SSD to read/write that data faster. A magnetic drive is a traditional hard disk drive (HDD). A hard disk drive (HDD) is a device providing persistent mass storage for a workstation or laptop by saving data even when the computer is turned off. Data is stored using platters with a magnetic coating that are spun under disk heads that can read and write to locations on each platter known as sectors. A solid-state drive (SSD) is a personal computer storage device that stores data in non-volatile special memory instead of on disks or tape. An optical drive is a storage device that uses a CD, DVD, or Blu-Ray disc to store and retrieve data.

Which of the following types of laptop displays would utilize a fluorescent backlight to illuminate the image? • LED • LCD • OLED • Plasma

LCD OBJ-1.2: A LCD (TFT) with fluorescent backlight has been the standard display technology for the last few years. The backlight is a fluorescent bulb that illuminates the image, making it bright and clear. An inverter supplies the correct AC voltage to the backlight from the laptop's DC power circuits. More modern laptops use LED displays that replace the fluorescent backlight with an LED backlight. OLED and plasma displays do not use a backlight.

Your friend just noticed their smartphone's battery is running low. Unfortunately, your friend isn't very knowledgeable about computers and smartphones, so they don't know what type of charging cable they need. They know their phone is running iOS 15. What kind of cable does your friend need to charge their phone? • USB-C • Lightning • Micro USB • Mini USB

Lightning OBJ-1.3: Lightning cables are used by Apple's iPhone, which are the only smartphones that run the iOS software. Since your friend is using iOS, he uses an iPhone (smartphone) or an older iPad (tablet). Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.

Which of the following cables is NOT used by Android smartphones and tablets? • Lightning • Micro USB • Mini USB • USB-C

Lightning OBJ-1.3: Android devices do NOT use the lightning cable because it is a proprietary 8-pin port and connector used solely by Apple devices. The Lightning connector is reversible and can be inserted in either direction. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.

Which of the following cables was a proprietary cable used in many iPhones and iPads? • USB-C • Mini USB • Micro USB • Lightning

Lightning OBJ-1.3: Apple's iPhone and iPad mobile devices use a proprietary 8-pin Lightning port and connector. The Lightning connector is reversible and can be inserted in either direction. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices.

Which of the following settings must be enabled on a mobile device to embed the GPS position into a photograph when using your device's camera? • Security profile • FDE • MDM • Location services

Location services OBJ-1.4: Location services enable the device to know its position using its internal GPS receiver or its approximate location using its cellular radio. To embed the GPS position into a photograph, location services must be enabled. Mobile device management (MDM) software suites are designed to manage the use of smartphones and tablets within an enterprise. Full device encryption (FDE) is used to encrypt the user and system data stored in the device's internal storage. The encryption key is stored in a protected portion of the device and can be used to remotely wipe the device if it is lost or stolen. A security profile is used to apply different permissions and functionality to an employee's mobile device and is usually configured by an MDM.

Dion Training has created a custom corporate application for its employees to access its student information database. This application is not found in the public App Store and must be installed directly on the device by one of the Dion Training system administrators. Which of the following technologies should the administrator use to install a profile with their security credentials and this custom application on an employee's iPhone? • NVMe • CDMA • GSM • MDM

MDM OBJ-1.4: Apple's iOS prevents custom applications from being loaded onto the device by default. To install a customer corporate application, the system administrator must install a profile with their security credentials along with the application onto the device using a mobile device management (MDM) suite. Once installed, the system administrator must go to Settings -> General -> Profiles and mark it as Trusted. Mobile device management (MDM) software suites are designed to manage the use of smartphones and tablets within an enterprise. The global system for mobile (GSM) communication standard for cellular radio communications and data transfer uses a SIM card to identify the subscriber and network provider. The code division multiple access (CDMA) communication standard for cellular radio communications and data transfer uses a method of multiplexing a communications channel using a code to key the modulation of a particular signal. Non-volatile memory express (NVMe) is an interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI.

Dion Training utilizes a strong authentication model for all of its internal services. If an employee needs to access one of the company's internal applications, they use their username, a password, and a one-time code texted to their smartphone to log in. Which of the following types of authentication is this known as? • TouchID • FaceID • MFA • SSO

MFA OBJ-1.3: Multifactor authentication is an authentication scheme that relies on at least two of the five factors: something you know, something you have, something you are, something you do, and somewhere you are. Since the user must enter their username and password, this is something they know. Since the user must enter a one-time code texted to their smartphone, this is something they have. Using this combination is considered two-factor (2FA) or multifactor authentication (MFA). Single Sign-on (SSO) is an authentication technology that allows users to authenticate once and receive authorizations for multiple services. The advantage of single sign-on is that each user does not have to manage multiple user accounts and passwords. The disadvantage is that compromising the account also compromises multiple services. Face ID is an Apple device feature that uses a face lock to grant access to the device. Face ID is considered a form of biometric authentication. Touch ID is an Apple device feature that uses fingerprint biometric information to grant access to the device.

Your cellular carrier allows you to turn on a feature on your smartphone so that you can share its internet connection with other devices close to your smartphone. If you wanted to share the internet connection with multiple devices simultaneously, which feature would you enable? • NFC • Bluetooth • Mobile hotspot • Tethering

Mobile Hotspot OBJ-1.3: A mobile hotspot can share that connection via Wi-Fi with nearby laptops, tablets, game consoles, or anything that can connect to a Wi-Fi network. This feature turns your smartphone into a Wi-Fi access point and then allows the other devices to connect to your smartphone and gain access to the internet. Tethering is another good option for this question, but tethering only supports a single device sharing the smartphone's internet connection at once. Tethering is the use of a mobile device's cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Bluetooth is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another.

A new smartphone supports users' ability to transfer a photograph by simply placing their phones near each other and "tapping" the two phones together. What type of technology does this most likely rely on? • BT • NFC • IR • RF

NFC OBJ-1.3: Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. Bluetooth (BT) is a wireless technology standard used for exchanging data between fixed and mobile devices over short distances using UHF radio waves in the industrial, scientific, and medical radio bands from 2.402 GHz to 2.480 GHz and building a personal area network (PAN). Bluetooth is commonly used when connecting wireless devices like mice, trackpads, headphones, and other devices. Infrared (IR) was a wireless networking standard supporting speeds up to about 4 Mbps with a direct line of sight for communications. Infrared sensors are used in mobile devices and with IR blasters to control appliances. While infrared (IR) used to be commonly used to connect wireless mice and keyboards to a laptop in the 1990s, it has fallen out of favor in the last 10-15 years since Bluetooth is more reliable and does not require a direct line of sight between the device and the laptop. Radio frequency (RF) is the propagation of radio waves at different frequencies and wavelengths. For example, Wi-Fi network products use a frequency of either 2.4 GHz or 5GHz.

Samantha works in the human resource department in an open floorplan office. She is concerned about the possibility of someone conducting shoulder surfing to read sensitive information from employee files while accessing them on her computer. Which of the following physical security measures should she implement to protect against this threat? • Privacy screen • Hardware token • Biometric lock • Badge reader

Privacy Screen OBJ-1.1: A privacy screen is a filter placed on a monitor to decrease the viewing angle of a monitor. This prevents the monitor from being viewed from the side and can help prevent shoulder surfing. The standard type of anti-glare filter consists of a coating that reduces the reflection from a glass or plastic surface. A biometric lock is any lock that can be activated by biometric features, such as a fingerprint, voiceprint, or retina scan. Biometric locks make it more difficult for someone to counterfeit the key used to open the lock or a user's account. A smart card is a form of hardware token. A smart card, chip card, or integrated circuit card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip. In high-security environments, employee badges may contain a smart card embedded chip that must be inserted into a smart card reader to log in or access information on the system. A badge reader is used to read an employee's identification badge using a magnetic stripe, barcode, or embedded RFID chip.

Jason's son has broken the RJ-45 port of his laptop by sticking clay into it, and there are no wireless networks available in his office building. The manufacturer of the laptop said the port cannot be replaced for at least a week. Which of the following would be the MOST appropriate workaround to get the laptop connected to the wired network at Dion Training's office quickly? • Replace the motherboard since it contains an integrated RJ-45 port • Enable NIC teaming to increase your bandwidth • Disable airplane mode and use the integrated 802.11ac adapter • Purchase and use a USB to RJ-45 adapter

Purchase and use a USB to RJ-45 adapter OBJ-1.1: Since the RJ-45 port on the laptop is most likely an integrated port on the motherboard, you will have to wait for the manufacturer to replace the motherboard for you. To get back onto the wired network at the office the quickest, you should purchase an external (USB) wired network adapter. These usually are small devices that will allow you to plug a wired network cable with an RJ-45 connector into the external adapter and connect it to the laptop using a USB port. This works just like the integrated RJ-45 adapter but can be installed in just a few seconds. Alternatively, you could use a port replicator or docking station if there was one available at the office. NIC teaming allows the grouping of multiple physical Ethernet network adapters into one or more software-based virtual network adapters for increased performance or fault tolerance. This would require multiple physical network interface cards to be installed in your laptop already, which is not the case in this scenario. Replacing the motherboard would work if you had one available, but the process can be time-consuming. It would be quicker and easier to simply use an external (USB) wired network interface adapter, instead. Airplane mode and 802.11ac adapters are used with wireless networks, therefore it cannot solve this issue since the office building does not have a wireless network available.

Your boss asked you to generate a simple square code that can be easily scanned by a smartphone to access a preconfigured website address or link. Which of the following technologies would BEST meet this requirement? • NFC chip • QR code • Barcode • Smart card

QR code OBJ-1.3: In this case, you should select a QR code to meet this requirement. A QR code is a square that contains a specific graphical pattern that can be read by a smartphone's camera. When read, the graphical pattern is converted to data, such as a website address or link that can be easily opened. QR codes can also be read by dedicated QR scanners, as well. A barcode is a pattern of different sized parallel bars, typically representing a product number, such as an ISBN, EAN, or UPC. The reader uses a sensor mechanism (typically either a photodiode, laser, or CCD) to read the intensity of light reflected by the barcode. The reader then reports the number back to application software, which links it to a product database. Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. This is commonly used for contactless payment systems, transferring contacts, or transferring a file from one device to another. A smart card, chip card, or integrated circuit card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip. In high-security environments, employee badges may contain a smart card embedded chip that must be inserted into a smart card reader to log in or access information on the system.

You are troubleshooting a memory issue on a customer's laptop and have determined that the memory module needs to be replaced. You walk into the storage room to select a memory module to use as a replacement. Which of the following choices would be the MOST LIKELY choice for you to select for use on the laptop? • ECC • SODIMM • Single Channel • DDR4

SODIMM OBJ-1.1: A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device. For the exam, if you are ever asked about installing memory in a small form factor device or a laptop, the answer will usually be SODIMM. Single-channel memory is any memory using one 64-bit bus between the CPU and the RAM. Error checking and correcting or error correcting code (ECC) is a type of system memory that has built-in error correction security. ECC is more expensive than normal memory and requires support from the motherboard. ECC is commonly used in production servers and not in standard desktops or laptops. Double data rate synchronous dynamic (DDR) random access memory is a standard for SDRAM where data is transferred twice per clock cycle to achieve a maximum data rate that is 64 times the bus speed in bps. There are various versions of DDR including DDR2, DDR3, DDR4, and DDR5.

Jason is teaching a CompTIA course at a large company, but they do not allow non-employees to connect to their network. Since Jason needs the Internet for an in-class demonstration, he connects his laptop to his iPhone using a USB cable. He essentially connects to the Internet using the smartphone as a modem. Which of the following terms best describes this configuration? • Tunneling • Baseband update • Hotspot • Tethering

Tethering OBJ-1.4: Tethering is the use of a mobile device's cellular data plan to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi. One method of doing this is to connect the laptop to the device using a USB cable, and then it can be used as a wired network connection. A portable hotspot is a dedicated mobile device that connects to a cellular network and provides a wireless (Wi-Fi) network for a small number of users. A tunneling (or encapsulation) protocol wraps up data from one protocol for transfer over a different type of network. For example, PPP can carry TCP/IP data over a dial-up line, enabling a remote computer to communicate with the LAN. A baseband update is the modification of the firmware of a cellular modem.

Jason's cellphone company advertises that they offer unlimited data. The internet at Jason's studio was not working today, so he turned on his mobile hotspot to upload the videos recorded today. Initially, the data transfer was occurring without any issues and Jason observed that his data was uploading at 25 Mbps. After 20-30 minutes, though, the speed of the connection dropped to only 0.125 Mbps. Which of the following is the MOST likely cause for this drop in speed during the upload process? • The smartphone reached the data cap for the month • The smartphone is undergoing a DDoS attack • The smartphone's battery has been depleted • The smartphone's 802.11 radio is broken

The smartphone reached the data cap for the month OBJ-1.4: A data cap or bandwidth cap is a service-provider imposed limitation on the amount of data transferred by a user's account or device over the cellular network. Many smartphone plans that advertise unlimited data still have a transfer limit. Once the limit is reached, these plans will either prevent all data transfer from occurring or slow down the speeds of data transfer. For example, T-Mobile offers unlimited data in the United States, but if a user transfers over 50GB of data then their data is deprioritized and transmitted at slower speeds. Other carriers will use a data throttling method, instead, which slows down all data sent for the remainder of the customer's billing cycle. A distributed denial of service (DDoS) attack is a denial of service attack that uses multiple compromised computers, called zombies, to launch the attack against a target. Based on the scenario, there is no evidence that the smartphone's battery is depleted since the phone is still online and transmitting data. The smartphone is not using Wi-Fi to transmit the data and there is no evidence that the 802.11 (Wi-Fi) radio is broken.

Which of the following cables is MOST widely used by modern Android smartphones and tablets? • Lightning • USB-C • Micro USB • Mini USB

USB-C OBJ-1.3: Modern Android devices most commonly use USB-C connections. USB-C is the default standard used in USB 3.1 with a 24-pin connector. The connector is reversible and can be inserted in either direction. Before USB-C, Android devices used either Micro USB or Mini USB connectors. Micro USB is a miniaturized version of the Universal Serial Bus (USB) interface developed for connecting compact and mobile devices such as smartphones, Mp3 players, GPS devices, photo printers, and digital cameras. Micro USB connectors exist or have existed in three forms: micro A, micro B, and micro USB 3. Mini USB was introduced with USB 2.0 and was used with digital cameras and early tablets. Mini USB is not commonly used in modern devices. Android devices do NOT use the lightning cable because it is a proprietary 8-pin port and connector used solely by Apple devices. The Lightning connector is reversible and can be inserted in either direction. Lightning is a proprietary computer bus and power connector created by Apple. The lightning cable is used by every iPhone from the 5 to 13 series. Newer iPads have shifted to the use of USB-C for charging instead of the lightning cable, though.

Which of the following technologies uses 2.4 GHz or 5 GHz frequencies to determine your location indoors based on the signal strength received or the angle of arrival of that signal to the mobile device? • GPS • Cellular • Wi-Fi • Bluetooth

WiFi OBJ-1.4: Location services enable the device to know its position using its internal GPS receiver or its approximate location using its cellular radio. A mobile device can use its internal GPS, cellular, Bluetooth, or Wi-Fi radios to identify its location. Wi-Fi positioning systems use the signal strength or angle of arrival of a signal to determine the device's location within 1-4 meters. Bluetooth can be used within a building to provide an accurate of the device within 3-4 meters. The use of Bluetooth and Wi-Fi to determine the device's location is known as an internal positioning system (IPS). Cellular radios can provide an approximate location based upon the triangulation of your position between different cellular towers. A GPS (global positioning system) device is used to determine a receiver's position on the Earth based on information received from 24 GPS satellites, which operate in a constellation in Medium Earth Orbit (MEO). The receiver must have a line-of-sight to four of the GPS satellites continuously to accurately determine its position on the earth (latitude, longitude, and altitude). The device's GPS receiver can provide an accurate location up to 10 meters.

You have been asked to replace the wireless 802.11ac card in an employee's laptop. Which of the following types of expansion cards is this? • PCIe • NVMe • miniPCIe (Correct) • SODIMM

miniPCIe OBJ-1.1: Mini PCIe (mPCIe) are smaller form factor versions of standard PCI Express expansions cards used with laptops and other small form factor computing devices. Mini PCIe expansion cards provide the ability to add wireless networking or cellular data cards to a laptop. Non-volatile memory express (NVMe) is an interface for connecting flash memory devices, such as SSDs, directly to a PCI Express bus. NVMe allows much higher transfer rates than SATA/AHCI. PCI Express (PCIe) is an expansion bus standard using serial communications. Each device on the bus can create a point-to-point link with the I/O controller or another device. The link comprises one or more lanes (x1, x2, x4, x8, x12, x16, or x32). Each lane supports a full-duplex transfer rate of 250 MBps (v1.0), 500 MBps (v2.0), or 1 GBps (v3.0). A small outline dual inline memory module (SODIMM) can be purchased in various types and sizes to fit any laptop, router, or other small form factor computing device.


Kaugnay na mga set ng pag-aaral

Chapter 4 - Business Communications

View Set

Chapter 33: The Great War: The World in Upheaval

View Set

TeXes ESL Supplement Practice Questions

View Set

Ch 17 Nursing Diagnosis objectives

View Set

Ch.3: Drug Action Across the Life Span

View Set