Deck 10: Mobile Devices
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/35
Play
Full screen (f)
Deck 10: Mobile Devices
1
iPad displays are known as multitouch touch screens. This means that they can sense the presence of two or more contact points.
True
2
Mobile device software is closed source and vendor-specific.
False
3
Apple releases iOS code as open source.
False
4
Because Apple's iOS is closed source, vendors cannot develop software for it.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
5
Android is an example of open-source software.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
6
Android devices have a location calibration utility called G-Sensor calibration.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
7
If a mobile device cannot be used to make phone calls, it also can't be used with GPS-enabled applications.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
8
Airplane mode turns off any wireless antenna in a device including GSM, Wi-Fi, GPS, and Bluetooth.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
9
Mobile devices are equipped with embedded wireless antennae to connect to wireless LANs because cellular connections may be slow when transmitting data.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
10
Mobile data windowing occurs when the mobile device shares its Internet connection with other Wi-Fi-capable devices.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
11
_________ means that the phone or other device connects to a PC via USB and accesses the Internet using the PC's Internet connection.
A) Internet pass-through
B) Wi-Fi tethering
C) Porting
D) None of the above
A) Internet pass-through
B) Wi-Fi tethering
C) Porting
D) None of the above
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
12
When troubleshooting mobile wireless connections, which of these is unlikely to be a factor?
A) The device is within range of the wireless network.
B) The correct SSID was entered (if manually connecting).
C) The device supports the encryption protocol of the wireless network.
D) None of the above.
A) The device is within range of the wireless network.
B) The correct SSID was entered (if manually connecting).
C) The device supports the encryption protocol of the wireless network.
D) None of the above.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
13
The process to synchronize a Bluetooth device to a mobile device is called ______.
A) Tethering
B) Enabling
C) Pairing
D) None of the above
A) Tethering
B) Enabling
C) Pairing
D) None of the above
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
14
Which of these is not a consideration when configuring a mobile device to receive email?
A) POP3
B) IMAP
C) Exchange
D) DNS
A) POP3
B) IMAP
C) Exchange
D) DNS
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
15
IMAP uses which port by default?
A) 25
B) 110
C) 143
D) 4443
A) 25
B) 110
C) 143
D) 4443
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
16
POP3 uses which port by default?
A) 25
B) 110
C) 143
D) 4443
A) 25
B) 110
C) 143
D) 4443
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not a way for mobile devices to connect to the Internet?
A) Cellular networks
B) Wi-Fi
C) Through a desktop computer.
D) AC outlets
A) Cellular networks
B) Wi-Fi
C) Through a desktop computer.
D) AC outlets
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
18
To synchronize iPad data such as contacts, calendars, and so on, PC users need to use iTunes for Windows.
A) iTunes for Windows.
B) Windows 7 or later.
C) Windows Data Manager.
D) You cannot synchronize data between an iPhone and a PC.
A) iTunes for Windows.
B) Windows 7 or later.
C) Windows Data Manager.
D) You cannot synchronize data between an iPhone and a PC.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
19
iOS ________is the process to remove the limitations that Apple imposes on its devices that run iOS.
A) Rooting
B) Cracking
C) Jailbreaking
D) Hacking
A) Rooting
B) Cracking
C) Jailbreaking
D) Hacking
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
20
When a hard reset is initiated on an Android device __________________________.
A) The password is retained.
B) All data will be wiped.
C) It will automatically look for the latest operating system.
D) None of the above.
A) The password is retained.
B) All data will be wiped.
C) It will automatically look for the latest operating system.
D) None of the above.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
21
Decent quality __________software secures, monitors, manages, and supports multiple different mobile devices across the enterprise.
A) MDM
B) Open source
C) Rooted
D) Utility
A) MDM
B) Open source
C) Rooted
D) Utility
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
22
To force-quit an app on an iOS-based device, press and hold the Sleep/Wake button for a few seconds until a red slider appears. Then press and hold the Home button until the app quits. What is the next step?
???Authors: Edits okay? San Dee
Yes) RB 11/7/2012
A) Then wait for the machine to restart.
B) Then press and hold the Home button until the app quits.
C) Then tap the Home button.
D) None of the above.
???Authors: Edits okay? San Dee
Yes) RB 11/7/2012
A) Then wait for the machine to restart.
B) Then press and hold the Home button until the app quits.
C) Then tap the Home button.
D) None of the above.
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) _________ is a combination of hardware and software that measures velocity in mobile devices.
A) Accelerometer
B) Gyroscope
C) Calibrator
D) None of the above
A) Accelerometer
B) Gyroscope
C) Calibrator
D) None of the above
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
24
A(n) ________ adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics.
A) Accelerometer
B) Gyroscope
C) Calibrator
D) None of the above
A) Accelerometer
B) Gyroscope
C) Calibrator
D) None of the above
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is the practice to track and record the location of a mobile device over time.
A) Geotracking
B) Calibrating
C) Global positioning
D) None of the above
A) Geotracking
B) Calibrating
C) Global positioning
D) None of the above
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
26
Matching
-Advanced RISC machine
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Advanced RISC machine
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
27
Matching
-Multitouch touch screen
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Multitouch touch screen
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
-Screen calibration
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Screen calibration
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
-Geotracking
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Geotracking
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
-Wi-Fi tethering
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Wi-Fi tethering
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
-Internet pass-through
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Internet pass-through
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
32
Matching
-Jailbreaking
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Jailbreaking
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
33
Matching
-Accelerometer
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Accelerometer
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
34
Matching
-Mobile Device Management
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Mobile Device Management
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck
35
Matching
-Gyroscope
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
-Gyroscope
A) A 32-bit reduced instruction set computing architecture designed for low-power consumption and simplicity
B) Display that can sense the presence of two or more contact points
C) Program on a mobile device that verifies the three axes (left to right, up and down, and back to front) are calibrated properly
D) The practice to track and record the location of a mobile device over time
E) When a mobile device shares its Internet connection with other Wi-Fi-capable devices
F) When a mobile device connects to a PC to use the PC's Internet connection
G) The process to remove limitations on Apple devices, giving the user root access and enabling a person to install unauthorized software
H) A combination of hardware and software that measures velocity in mobile devices
I) Software that secures, manages, and monitors multiple mobile devices from a central location
J) Adds the measurements of pitch, roll, and yaw to mobile devices, just like in the concept of flight dynamics
Unlock Deck
Unlock for access to all 35 flashcards in this deck.
Unlock Deck
k this deck