Learning unit 7 Flashcards

1
Q

Four most popular mobile OSs:

A

-Android OS by Google
Based on Linux

-iOS by Apple
Based on macOS

-Windows 10 Mobile by Microsoft
Based on Windows 10

-Windows 10 Mobile by Microsoft
Based on Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss Android managed by Google

A

-Based on Linux and uses a Linux kernel
-Linux and Android are open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Releases of Android

A

-Jellybean
-KitKat
-Lollipop
-Marshmallow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Things that the Android OS can do

A

-Use an embedded browser

-Manage a database using SQLite

-Connect to Wi-Fi, Bluetooth, and cellular networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Functions of a digital assistant

A

responds to a user’s voice commands with a personable, conversational interaction to perform tasks and retrieve information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Google’s approach to security with Chrome OS:

A

-Sandboxing
-Verified boot
-Power washing
-Quick updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Differences between open source and closed source

A

Open source:
can be obtained from many sources

Closed source:
only have access to APIs, which are calls to the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disadvantages of open source

A

-No assurance of quality
-The market is not always convenient for developers

-Many variations of Android exist, creating incompatibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information that might be used when a connection is first made

A

-IMEI – a unique number that identifies each mobile phone or tablet device

-IMSI – a unique number that identifies a cellular subscription for a device or subscriber

-ICCID – identifies the SIM card,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

USB connectors used

A

microUSB, miniUSB, and USB-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Bluetooth

A

a short-range wireless technology to connect two devices in a small PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define IR (infrared)

A

a wireless connection that requires an unobstructed “line of sight” between the transmitter and receiver within 30 m of each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Near Field Communication (NFC)

A

a wireless technology that establishes a communication link between two NFC devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference between syncing and backups

A

Syncing mirrors app data and other content among your devices and/or the cloud that use the same Apple or Google account

Backups are copies of app data, configuration settings, and other content stored in case you need it to recover from a failed, lost, or corrupted device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Back-Up and Recovery options:

A

-File-level backup

-Partial image-level backup

-Combination of file-level and partial image-level backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lock methods to control access to the device

A

-Screen lock

-Swipe lock

-PIN lock

-Passcode lock

-Pattern lock

-Fingerprint lock

-Face lock

17
Q

Screen lock options:

A

-Restrict failed login attempts
Specify that data be erased after a certain number of failed login attempts, or block further attempts

-Full device encryption
Encrypts all the stored data on a device

-Multifactor authentication
Requires two forms of authentication

18
Q

Software can help secure data through

A

-OS updates

-Antivirus/anti-malware

-Trusted sources

-Firewalls

19
Q

Discuss BYOD (Bring Your Own Device)

A

-An employee or student is allowed to connect his own device to the corporate network

-For security purposes, an organization configures the person’s device before allowing it to connect to the network

-Utilizes security profiles

20
Q

Define security profiles

A

a set of policies and procedures to restrict how a user can access, create, and edit the organization’s resources

21
Q

Symptoms that might indicate malware might be at work:

A

-Power drain, slow data speeds

-Dropped phone calls or weak signal

-Unintended Wi-Fi and Bluetooth connections

-Unauthorized account access

-Unauthorized location tracking

22
Q

General steps for removing malware from a mobile device

A

-Uninstall the offending app

-Update the OS

-Perform a factory reset

23
Q

tips to keep a mobile device clean

A

-Keep OS updates current

-install an anti-malware app

24
Q

Define Internet of Things (IoT)

A

Devices connected to the Internet for a specific purpose

25
Q

What wireless technologies are used by smart home devices

A

Z-Wave and Zigbee
Wi-Fi and Bluetooth

26
Q

You can enhance a smart home network with

A

-Smart speaker
-Controller hub

27
Q

Solving short battery life

A
  • Disable wireless connections and close apps when you’re not using them
  • look into a replaceable battery
28
Q

Solving Inaccurate touch screen response

A

Remove protective cover

29
Q

Solving unresponsive touch screen

A

-Clean the screen with a soft, damp cloth

-Don’t use the touch screen when your hands are wet

-Restart the device

30
Q
A