CompTIA A+ 1001 App Flashcards
The Mobile device screen technology that uses no backlight is ______?
OLED
LCD
LED
BYOD
OLED
A user has requested a Laptop Memory upgrade. The tech tries to put in New Memory, but the Memory module is barely too wide for the slot. What is the most likely scenario?
The Tech is trying to install MicroDIMMs into SODIMM Slots.
The Tech is trying to install DDR3 into a Motherboard with DDR4 Slots.
The Tech is trying to install DDR4 into a Motherboard with DDR3 Slots
The Tech is trying to install DIMMs into SODIMM slots.
The Tech is trying to install DDR4 into a Motherboard with DDR3 Slots.
The type of battery that is the most commonly found in laptops produced today is ______?
Nickel Metal Hydride
Duracell
Lithium Ion
Nickel Cadmium
Lithium Ion
The type of mobile device that was designed to be able to read books on the go is _____?
phablet
tablet
smartphone
e-reader
e-reader
Leonard just brought an extremely expensive comic book and paid for it using the stored credit card information on his smartphone. The technology he used to make the transaction is _____?
WIFI Calling
Swipe Lock
Bitlocker to Go
NFC
NFC
You are explaining various connection types to new corporate smartphone and tablet users. What best describes the concept of Tethering?
When a Bluetooth device uses another device’s WIFI connection to get on the Internet.
When a WIFI device uses another device’s cellular connection to get on the Internet.
When a WIFI device uses another device’s Bluetooth connection to get on the Internet.
When a cellular device uses another device’s WIFI connection to get on the Internet.
When a WIFI device uses another device’s cellular connection to get on the Internet.
When a WIFI Enabled device attaches to a Cellular Device to get on the Internet, it is called Tethering. The Cellular device is commonly called a Mobile Hotspot.
A Technician is configuring a Mobile Customer to use email through an ISP. Port number that he should configure to use SMTP is?
110
25
995
143
25
You need to set up a Bluetooth headset for a user. He wants to know the farthest he can be away from his phone and still have it work. You do not have the Documentation handy. The most likely max range that is Bluetooth accessory will have is _____?
1 km
100 m
10 cm
10 m
10 m
What best describes the job of an Inverter on a Laptop?
It converts AC power to DC power for the display backlight.
It converts DC power to AC power for the display backlight.
It changes the Screen Orientation when the laptop is rotated.
It allows the laptop display to function Tablet mode.
It converts DC power to AC power for the display backlight.
The laptop power supply converts AC power into DC power for the laptop’s internal circuitry. The display backlight, if used, needs AC power. The inverter’s job is to convert (invert) the DC power into AC power for the backlight.
Bob has connected his Smartphone to the USB port on his laptop. He is using the phones cellular connection to connect his laptop to the Internet. Alice is using WIFI connection to Bob’s phone to access the Internet. Bob’s phone is _____ to his laptop and is acting as a _____?
paired, hotspot
synchronized, server
tethered, server
tethered, hotspot
tethered, hotspot
You have a Mobile Touch screen device with a Screen size of 11”. What is the most likely classification of this Device?
Tablet
GPS
Smartphone
Phablet
Tablet
The max distance of a Class 2 Bluetooth device is _____?
10 m
100 m
33 m
1 m
10 m
Class 1 is best at 100 m, Class 3 is worst at 1 m.
What best describes an IMEI?
The code used for NFC pay applications.
The Description of the user and mobile network.
The phones serial number
The Carrier code.
The Phone’s Serial Number.
A User wants to attempt to make sure that their boss can’t see what they are, based on tracking their iPhone. What should be disabled?
Tracking Services
Airplane Mode
GPS
Location Services
Location Services
You connect two Bluetooth devices that have been previously connected. The process that each device uses to Verify the other’s identify is called ____?
Pairing
Synchronization
SSO
S/MIME
SSO