A+10 - Quiz - Mobile Devices

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which mail protocol commonly uses TCP port 587? A. SMTP with SSL B. SMTP with TLS C. IMAP4 with SSL/TLS D. POP3 with SSL/TLS

B. SMTP with TLS uses port 587 by default. With SSL, SMTP uses port 465. IMAP4 with SSL/TLS uses port 993, while POP3 with SSL/TLS uses port 995.

Which OS is considered to be closed-source? a. Android OS b. iOS c. Bluetooth d. Linux

B. The Apple iOS is a closed-source vendor-specific operating system. Android is a type of Linux, which are both open-source. Bluetooth is a wireless standard, not an OS.

What are two common operating systems used by mobile devices? (Select the two best answers.) a. Blueberry OS b. iOS c. Android OS d. Google OS

B, C. Two common OSes used by mobile devices are iOS, used by Apple devices, and Android OS, used by many different companies. BlackBerry OS is the OS used on BlackBerry devices. Android is effectively controlled by Google. There is a Google Chrome OS designed to work with web applications, which is also open-source.

An application won't close on an Android smartphone. You've tried to Force Stop it to no avail. What should you do? ○ A. Hard reset the device. ○ B. Stop the service in Running Services. ○ C. Soft reset the device. ○ D. Bring the device to an authorized service center.

C. If you've already tried to stop the application within Running Services, attempt a soft reset. Pull the battery if the application is frozen. Hard resets on Android devices should be used only as a last resort as they will return the device to factory condition—wiping all the data. The question said that the application won't close, not a service, though you could try finding an underlying service that might be the culprit. But try resetting the device before doing this or bringing it to an authorized service center.

Which of the following can Apple's Find My iPhone application not do? A. Remotely lock the device B. Remotely wipe the device C. Locate the device D. Alert the authorities

D. Locator applications tend to leave reporting thefts to the user. Because not all losses are due to theft and because the user would need to determine the authorities to contact, this feature is not seen in such applications. The location information can certainly be relayed to the authorities. These applications tend to allow messages to be displayed on the device's screen as well.

Directly under which of the following iOS menus can you find the Software Update utility? A. General B. iCloud C. Notifications D. Security

A. Software Update is a selection found under Settings > General in the iOS. There is no Security menu per se, although keeping your iOS updated is considered a proactive security measure.

By what name was Google Play formerly known? A. Google Market B. Android Market C. Android Play D. App Store

B. Google Play used to be called the Android Market. The App Store is Apple's equivalent.

Which of the following can be described as removing limitations on iOS? ○ A. Rooting ○ B. Jailbreaking ○ C. Geotracking ○ D. AV software

B. Jailbreaking is the process of removing the limitations of an iOS-based device so that the user gets superuser abilities. Rooting is a similar technique used on Android mobile devices. Geotracking is the practice of tracking a device over time. AV software is antivirus software, used to combat malware.

What type of port do Android mobile devices use for charging? a. Mini-USB b. Micro-USB c. Proprietary d. PAN

B. Most Android mobile devices use a Micro-USB port for charging (or similar port that is backward compatible to Micro-USB). It can be plugged into a PC or into an AC outlet. Mini-USB is the older port used by mobile devices. Apple devices use a proprietary port for charging. A PAN is a personal area network, often inhabited by Bluetooth devices.

What would a user need to synchronize contacts from an iPad to a PC? a. Android Synchronization Application b. iTunes c. Google Play d. ActiveSync

B. PC users need iTunes to synchronize contacts and other data from an iPad to a PC. There are many Android sync programs, but they do not work on Apple devices. Google Play is a place to get applications and other items. ActiveSync is the older Microsoft sync program used to synchronize Windows CE and Mobile to PCs. (d

Which technology would you use if you wanted to connect a headset to your mobile phone? a. GSM b. Wi-Fi c. Bluetooth d. Exchange

C. The Bluetooth standard is used to connect a headset and other similar devices over short range to a mobile device. GSM is used to make voice calls over cellular networks. Wi-Fi is used to connect mobile devices to the Internet. Exchange is a Microsoft email server; some mobile devices have the ability to connect to email accounts stored on an Exchange server.

What kind of display would an iPad2 use? a. CRT b. Tap screen c. Multitouch d. Singletouch

C. iPad2 devices and many other devices use multitouch screens, which allow more than one contact point. Cathode ray tube (CRT) is an older technology monitor used by desktop computers. You would "tap" the screen, but it is known as a touch screen. Singletouch screens are an older technology, you won't see much of that in the field.

What do third-party apps such as Find iPhone rely on? ○ A. Passcode ○ B. Google Apps Device Policy ○ C. Bluetooth ○ D. GPS

D. Third-party locator apps such as Find iPhone and Where's my Droid rely on GPS to locate the device. Passcodes are used to prevent unauthorized users from accessing the mobile device. Google Apps Device Policy can initiate a remote wipe on a mobile device. Bluetooth is used so the mobile device can communicate with other devices over short range.

Which of the following is not a valid reason to disable cellular data networking? A. You have a limited amount of data in your monthly plan. B. You have access to a reliable WiFi signal. C. You are about to download an update to your phone. D. Your phone calls are going out over your carrier's cellular network.

D. Whenever you have a reliable WiFi signal available that you do not pay for as you go, you should feel free to disable your cellular access to data networking. The wireless network is often faster and does not cost you anything to use. If data networking works better when you leave the cellular network available to fall back on, you can choose to disable it only for certain large downloads or disable it completely until the download is complete. Phone calls will continue to be sent out over the cellular network. This does not imply that your data is not using an available WiFi connection. Therefore, unless you are particularly sensitive to the situation or know that data is going out over your cell access, you might not need to disable the cellular data networking feature.

Which of the following is not a requirement for installing iTunes on a Windows machine? A. A 1GHz processor or better B. 512MB of RAM or higher C. 200MB of available disk space D. The x64 versions of Windows

D. You can install iTunes on the supported x86 versions of Windows as well.

Which of the following are universally common items that are synced between a mobile device and a larger computer? (Choose three.) A. Office documents B. Contacts C. Operating system files D. Email E. Configuration settings F. Apps

B, D, F. The items most often able to be synchronized are contacts, apps, email, photos, music, and videos. (b, d

Which of the following statements about configuring email access on a mobile device is true? A. Most Internet mail services offer an Exchange option. B. The TCP ports used for configuring access are usually standard port numbers. C. Most ports used for access are UDP ports. D. You must download third-party apps for connecting to email services.

B. Mail access uses standard secure or insecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.

Where might you find applications for mobile devices? (Select the three best answers.) a. App store b. Windows Media Player c. Market d. Google Play

A, C, D. When it comes to applications, Apple uses the App Store (which can also be accessed through iTunes). Android devices use the Android Market and Google Play. Windows Media Player is used to play audio and video files within Windows.

You are required to install a locator application on a mobile device. What is this application dependent on? (Select the two best answers.) a. Location Services b. Bluetooth c. GPS d. GSM

A, C. The locator application will be dependent on enabled GPS or Location Services. Bluetooth deals with the communication of wireless devices over short distances. GSM is used to make phone calls over cellular networks. (C,D

What are a couple of differences between a tablet computer and a laptop? (Select the two best answers.) a. Tablets have little or no field serviceable parts. b. Tablets are upgradable. c. Laptops don't use touch screens. d. Tablets use integrated flash memory as the hard drive. e. Tablets use RAM.

A, D. Unlike laptops, tablets are not field serviceable, and they use integrated flash memory instead of an SATA magnetic or SSD hard drive. Tablets are for the most part not upgradable. Some laptops do come with touch screens. Both tablets and laptops use RAM.

Which of the following are text-messaging services used with mobile devices? (Choose two.) A. SMS B. SIP C. Androtext D. iOS Messaging E. iMessage

A, E. SMS is the most widely supported text-messaging service, across all platforms and service providers. Apple's iMessage is a proprietary service that does not require cellular access to send text messages.

When configuring a Wi-Fi connection, what step occurs after successfully entering the SSID? a. Enter a passcode for the network. b. Select POP3. c. Check whether the device is within range of the WAP. d. Scan for networks.

A. After you enter the SSID (if it's correct) you would enter the passcode for the network. POP3 has to do with configuring an email account. If you have already entered the SSID, you should be within range of the wireless access point (WAP). Scanning for networks is the first thing you do when setting up a Wi-Fi connection. (c

Which of the following is not a type of Android passcode lock that can be set? A. Spoken passphrase B. Drawn pattern C. Numeric PIN D. Password

A. All of these options can be used to set a passcode on an Android mobile device except speaking a passphrase.

What type of CPU do mobile devices use? a. ARM b. Core i7 c. Phenom II d. Pentium

A. Most commonly, mobile devices use ARM (Advanced RISC Machine) CPUs. Core i7, Phenom II, and the older Pentium are used by desktop and laptop computers.

Which of the following do modern mobile devices most likely have? A. SSD B. Keyboard connector C. Optical disc drive D. Video connector

A. Most modern devices use a solid-state drive (SSD), called internal storage, instead of a traditional magnetic drive to store permanent information. Memory cards can often be used to augment the SSD's storage capacity.

Which of the following features is not supported when you are unable to zoom in on a picture or screen of information by placing two fingers together on the screen and spreading them? A. Multi-touch B. TouchFLO C. SuperPinch D. Resistive touchscreen

A. Multi-touch is the feature that allows pinch-to-zoom technology. Spreading your fingers apart zooms in, while pinching your fingers together zooms out. TouchFLO is the HTC technology that features multiple screens that you can flip between. SuperPinch does not exist, and as unpopular an idea as it may seem, even resistive touchscreens are technically capable of multi-touch.

What is the default TCP port number for SMTP? A. 25 B. 110 C. 143 D. 995

A. SMTP sends mail to the server at TCP port 25. POP3 uses port 110. IMAP4 uses 143, and port 995 is used by POP3 securely over SSL or TLS.

Your organization is concerned about a scenario where a mobile device with confidential data is stolen. What should you recommend first? (Select the best answer.) a. Remote wipe program b. Remote backup application c. Passcode locks d. Locator application

A. The remote wipe application is the most important one listed. This will prevent a thief from accessing the data on the device. Afterward, you might recommend a backup program (in case the data needs to be wiped), as well as passcode locks and a locator application.

Bob's iPhone 4S cannot detect when he turns his device to the left and right like it's a steering wheel. Games and other apps that require this motion will not work correctly as a result. Which component has failed in Bob's phone? A. Gyroscope B. Accelerometer C. Magnetometer D. GPS

A. Three gyroscopes are used to detect roll, pitch, and yaw. The problem is with the gyroscope that detects yaw. The accelerometer would be suspect if the iPhone were not detecting flat movement to the side or forward and backward. The magnetometer can only help with compass headings and the GPS with geographical positioning. (b

Which of the following is more likely to be associated with a resistive touchscreen versus a capacitive one? A. You won't have to apply as much pressure. B. You will need to recalibrate it. C. You will have to clean it more often for optimal functionality. D. You can use the pad of your finger instead of your fingernail.

B. Resistive touchscreens require pressure to actuate them, while capacitive ones do not and instead can be actuated by the fleshy part of the human finger. Body oils, moisture, and dirt are not as detrimental to the effectiveness of resistive screens as they are to capacitive screens.

Which of the following allows other mobile devices to share your mobile device's Internet connection? a. Internet pass-through b. Wi-Fi tethering c. Locator application d. IMAP

B. Wi-Fi tethering allows a mobile device to share its Internet connection with other Wi-Fi capable devices. Internet pass-through is when the mobile device connects to a PC to share the PC's Internet connection. Locator applications are used to find lost or stolen mobile devices through GPS. IMAP is another email protocol similar to POP3.

You are concerned with the possibility of jailbreaks on your organization's iPhones, and viruses on the Android-based devices. What should you implement? a. Firewall b. AV software c. Mobile Device Management d. Device reset

B. You should implement antivirus (AV) software. This can protect against viruses and other malware as well as jailbreaks on Apple devices. As of the writing of this book, firewalls for mobile devices are not common, but that could change in the future. Mobile Device Management (MDM) is software that runs at a central computer enabling a user to configure and monitor multiple mobile devices. Device resets are used to restart the mobile device, or to reset it to factory condition depending on the type of reset, and the manufacturer of the device. (c

Which of the following are you most likely to be able to do to a larger mobile device, such as Apple's iPad? A. Replace the internal SSD B. Add additional RAM C. Upgrade the processor D. Print over WiFi or Bluetooth

D. You should not count on being able to do anything that involves opening the device. Many tablets and phones offer options for printing wirelessly, sometimes with the purchase of additional software or hardware to assist.

Which of the following built-in components is used by location services to find a lost mobile device? A. Gyroscope B. Accelerometer C. Global positioning system D. Magnetometer

C. The GPS transceiver, WiFi connection, and cellular network are used to home in on the geographical location of a missing mobile device.

If you do not have your iPhone 4S set to erase data after too many failed login attempts but your phone still locks you out after making the maximum allowable attempts, how can you unlock the phone? A. By having it send you an email with the passcode B. Only by taking into an Apple Store C. By plugging it into the last computer that it synced with in iTunes D. By holding down the sleep/wake and home buttons simultaneously

C. The fact that the iPhone is attached to the computer with which it last synced indicates that the owner is likely in possession of it. Servicing the phone is not required, and performing an Apple reset will still have you locked out as a security precaution.

What does the iOS Simple Passcode allow a person to enter? ○ A. 4-letter code ○ B. 6-number PIN ○ C. 4-digit passcode ○ D. Alpha-numeric passcode

C. The iOS Simple Passcode allows only a 4-digit numeric passcode. To enter alpha-numeric passwords, you need to disable Simple Passcode. (a

Which of the following is a characteristic of Bluetooth? A. Bluetooth connections support wireless device control but not file transfers. B. Bluetooth is not yet a fully standardized protocol. C. Bluetooth connections do not reach as far as WiFi connections. D. You must reboot paired devices to complete connection establishment.

C. The range of Bluetooth connections is considered short compared to WiFi connections. Bluetooth is a fully standardized protocol that supports file transfers using FTP. Rebooting, or even restarting, paired devices is not a requirement for Bluetooth connection.

Which of the following is not a difference between iOS and Android? A. Android is not a proprietary operating system. B. You can download iOS apps from only one place. C. You can make a cellular phone call from all Android devices. D. It costs more to be a developer of iOS apps.

C. There is no requirement of either operating system that the devices they are on have cellular calling capability.

You want to prevent a person from accessing your phone while you step away from your desk. What should you do? ○ A. Implement remote backup. ○ B. Set up a remote wipe program. ○ C. Configure a screen lock. ○ D. Install a locator application.

C. You should configure a screen lock: either a pattern drawn on the screen, a PIN, or a password. Remote backup, remote wipe, and locator applications will not prevent a person from accessing the phone.

A user wants to stop his tablet from shifting horizontally when he turns it. Which of the following should you enable? a. Accelerometer b. Gyroscope c. Lock Rotation d. Screen Calibration

C. You should enable Lock Rotation on Apple devices. On Android devices you should disable Auto-rotate. The Accelerometer is a term used by Apple to describe the hardware/software that controls the three axes of movement. The Gyroscope is another term used by Apple to describe the device that measures the additional three movements (pitch, roll, and yaw) of newer Apple devices. Screen calibration is used to reset the device that measures the three axes.


संबंधित स्टडी सेट्स

NCLEX-RN Renal, Urinary, & Reproductive systems.

View Set

AP Human Geography Chapter 2 Review Sheet Population Bramlett Rubinstein

View Set

International Relations Comprehensive

View Set

Food Nutrition, Food Provenance, Health and Safety

View Set