Computer Technology 12 - Chapter 25, 26

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which mobile OS enables developers to customize the user experience without restrictions?

Android

Which mobile operating systems requires a third-party software firewall?

Android

Users bringing personally owned mobile devices into an enterprise environment is called:

BYOD (Bring Your Own Device)

Which type of display responds to the difference in electrical potential between you and the screen?

Capacitive

Which of the following is used in mobile devices to convert analog video and sound to digital video and sound?

Digitizer

What are the steps involved in pairing a Bluetooth keyboard with a tablet?

Enable Bluetooth on the tablet; turn on the Bluetooth device; find the device with the tablets enter a PIN code or other pairing sequences

A great way to protect data on a removable media card is to....?

Encrypt it

What can a government use to determine your location at a specific time as long as you're using your mobile device?

Geotracking

A client calls and is upset that he's misplaced his iPad. The mobile device has literally thousands of client records, including business addresses, e-mail, addresses, phone numbers, and, in some cases, credit card information. What should he do first?

He should access his iCloud account and remotely wipe his iPad to erase all personal data.

Which of the following is a 15-digit number used to uniquely identify a mobile device that connects to a cellular network?

IMEI

Patty has both Gmail and a traditional (SMTP/POP3) e-mail account. She wants to consolidate the traditional account into her Gmail account. Where does she do this?

In the Gmail appp and In the traditional e-mail server's settings

Which of the following would be a legitimate reason a mobile device is running slowly?

Lack of stroage space

Joyce notices her GPS map app gives the error "GPS coordinates not available." What should she try first?

Move to a place where she can get a good GPS signal

Fred wants to play World of Warcraft on his desktop system. He logs in and then the game asks for a code that is generated by an authenticator app on his Android phone. This is an example of:

Multifactor authentication

Leonard just purchased a very expensive comic book and paid for it using the stored credit card information on his smartphone. What technology did he use to make the transaction?

NFC (Near Field Communication)

Pamela decides to add a traditional e-mail app to get her e-mail. Which of the following will she most probably need to configure the app?

Name of her IMAP server and Name of her SMTP server

Which mobile device screen technology uses no blacklight?

OLED

Jailbreaking an iPhone gives access to

The root account

What information do you need to connect an Android-based tablet to an IMAP account?

User name, passowrd, sending and receiving server addresses

You've lost your iPhone. What would you use to try to find it?

iCloud


Ensembles d'études connexes

Chapter 09. Participation, Campaigns, and Elections

View Set

Chapter 4: Gravity

View Set

Module 1 Quiz - Introduction to Health and Wellness an Overview

View Set

Abnormal Psychology Ethics - Chapter 18 +Lecture 3

View Set

CLO Review (Cardiovascular and Valvular Disorders)

View Set

Environmental science/ minerals and mining

View Set