Lesson 8: Supporting Mobile Devices Flashcards
A user states that a mobile phone does not hold a very good charge. What might the cause be? (Select all that apply.)
A. Improper battery charging
B. Lack of power management
C. An aging battery
D. Unresponsive digitizer
A. Improper Battery Charging, B. Lack of Power Management and C. An Aging Battery
A. An improper charging routine will reduce the usable life of a battery. Following manufacturer instructions on the proper charging and discharging of the battery is recommended.
B. Making use of power management features included with a device/OS to prolong battery life is a good practice.
C. As batteries age, the maximum charge they can sustain decreases, so short battery life will usually indicate that the battery needs replacing.
Other options
D. Symptoms such as the touch screen not responding to input indicate a problem with the digitizer. This would not affect battery life.
A user returned a new laptop to the helpdesk with complaints that the screen was too dark and that the desktop image they put on it burned into the display. What kind of display does the laptop most likely have?
A. Touch screen
B. LED
C. TFT
D. OLED
D. OLED
In an organic light-emitting diode (OLED) display, or technically an advanced matrix OLED (AMOLED), the panel does not require a separate backlight, but the screen is darker, and images burn into the screen easier.
Other Options
A. A touch screen is a display screen combined with a digitizer that is responsive to touch input. Smartphone, tablet, and hybrid tablet/laptop form factors all use touch screens.
B. Light-emitting diodes (LED) are small, low-power lamps used both as diagnostic indicators, the backlight for a TFT display, and (as an organic LED array) in high-quality flat panels.
C. A thin-film transistor (TFT) is a specific display technology used to implement modern flat-panel LCD displays. The liquid crystal elements and transistors sit on the TFT.
A technician needs to replace a solid-state drive (SSD) in a user’s laptop. The technician requested the purchasing department to order a drive that has higher bus speeds than other SSDs and fits into a PCI Express bus when incorporating the appropriate adapter. Which drive type does the purchasing department order?
A. M.2
B. mSATA
C. SATA
D. uSATA
A. M.2
An M.2 SSD usually interfaces with the PCI Express bus, allowing much higher bus speeds than SATA. M.2 adapters can be of different lengths.
Other options
B. A card with a Mini-SATA (mSATA) interface might house an SSD. These cards resemble Mini PCIe cards but are not physically compatible with Mini PCIe slots.
C. Laptop hard disk drives (HDDs) are usually 2.5” form factor, though sometimes they use 1.8” form factor. These drives use a traditional SATA connector.
D. The uSATA connector is the same as the mSATA connector, and they sometimes use the names interchangeably.
A network technician trains a new employee on the company devices they received during orientation. Which devices will usually have both a front and rear camera? (Select all that apply.)
A. Digital camera
B. Smartphone
C. Tablet
D. Webcam
B. Smartphone and C. Tablet
B. Smartphones have both front-facing and rear-facing camera lenses, both of which can function either as a still camera or as a webcam for video recording and streaming.
C. Tablets have both front-facing and rear-facing camera lenses, both of which can function either as a still camera or as a webcam for video recording and streaming.
Other options
A. A digital camera allows for video recording or web conferencing and users can also take still pictures with them.
D. A webcam is a type of digital camera used to stream and record video. The front and rear cameras on smartphones and tablets can function as webcams.
Enterprises use different deployment models to specify how they provision mobile devices and apps for employees. Which function of enterprise management allows the organization to perform remote wipes on devices?
A. App store
B. EMM
C. MDM
D. MAM
C. MDM
Mobile device management (MDM) sets device policies for authentication, feature use (camera and microphone), and connectivity. MDM can also allow device resets and remote wipes.
Other options
A. An app store is a feature of mobile computing that provides a managed interface for installing third-party software apps.
B. Enterprise mobility management (EMM) is a class of management software designed to apply security policies to the use of mobile devices and apps in the enterprise.
D. Mobile application management (MAM) sets policies for apps that can process corporate data and prevents data transfer to personal apps.
A technician plans a memory upgrade for a fleet of computers for sales users. When evaluating the various types of memory modules, what module types are commonly used for ultraportable laptops? (Select all that apply.)
A. DIMM
B. SODIMM
C. Mini-DIMM
D. Micro-DIMM
C. Mini-DIMM and D. Micro-DIMM
C. A mini-DIMM has a smaller form factor than a small outline DIMM (SODIMM) form factor and is used in compact and ultraportable devices.
D. A micro-DIMM has a much smaller form factor than a small outline DIMMs (SODIMM). A micro-DIMM is used with ultraportable devices.
*Other options**
A. A dual inline memory module (DIMM) is a memory form factor that is used in desktop systems
B. Laptop memory is packaged in small outline DIMMs (SODIMMs). A SODIMM is like a DIMM only it has a smaller form factor for laptop use rather than on a desktop. However, SODIMM is not used in ultra-portable laptops.
A traveling user looks to purchase a smartphone that has a high tolerance for differing environments. This includes indoor and outdoor use. What ingress protection (IP) rating does the user look for when wanting to protect the device from solids as best as possible?
A. IP67
B. IP57
C. IP58
D. IPX8
A. IP67
Some mobile-device cases provide a degree of waterproofing. Waterproofing is rated on the ingress protection (IP) scale. The first (6) is a rating for repelling solids. In this case, dustproof.
Other options
B. With an ingress protection (IP) scale, the first number located after “IP” is used for solids rating. A 5 is a dust-protected rating which is not as protective as a 6.
C. When using an ingress protection (IP) scale, two numbers are designated after “IP.” The first digit is for solids rating and the second is for liquids.
D. In an ingress protection (IP) scale, the second value (8) is for liquids, 8 being protected from immersion beyond 1 m. The X means there is no rating.
A non-tech savvy laptop user orders a new hard drive from a large online retailer to install in the laptop. When the drive arrives, the user discovers that it is physically too big to install. What size drive did the user order?
A. 1.8 in.
B. 9.5 mm
C. 7 mm
D. 3.5 in.
D. 3.5
A 3.5” disk drive is the traditional drive size that is used in computer systems. These are magnetic drives.
Other options
A. Laptop HDDs are usually 2.5” form factor, though sometimes the 1.8” form factor is used. The 1.8” drive is used in smaller and more compact laptops.
B. A standard 2.5” drive has a z-height of 9.5 mm. The z-height is a measurement derived from the size of the internal components.
C. An ultraportable laptop might require a 7 mm (thin) or 5 mm (ultrathin) drive. These drives are the smallest traditional drive sizes.
A user purchased their first smartphone and wants to download useful apps to it. What must the user do before they can use the app store?
A. Grant privileges.
B. Synchronize between multiple devices.
C. Autodiscover.
D. Configure an account.
D. Configure an account
The owner of a mobile device configures an account when they use the device for the first time. This account manages the apps installed on the device and represents the user on the app store.
Other options
A. Apps run in a sandbox and have only the privileges granted by the user. An app will normally prompt when it needs to obtain permissions.
B. An owner account can allow app settings and data to synchronize between multiple devices. For example, a user can access their contacts list from both their mobile device and their laptop.
C. Most commercial email providers allow the OS to auto-discover email connection settings. Autodiscover means that the mail service has published special domain name system (DNS) records that identify how to connect.
A mobile device user is traveling out of the area and left their device somewhere outside. The user wants to track where they last had their mobile device in order to retrace their steps and find the device. Which of the following options is the system that relies solely on satellite communication to pinpoint a device’s location and help the user find their device?
A. Geolocation
B. Location Service
C. Near Field Communication
D. Global Positioning System
D. Global Positioning System (GPS)
Global Positioning System (GPS) is a means of determining the device’s latitude and longitude based on information received from orbital satellites via a GPS sensor.
Other options
A. Geolocation is the use of network attributes to identify (or estimate) the physical position of a device. A mobile device operates a location service to determine its current position.
B. Location service is a feature of mobile computing that identifies or estimates the device’s geographical position using GPS and/or network data.
C. Near-field communication allows for very short-range data transmission – usually up to 20 cm/8 in. This type of communication system is best suited for chip readers and would not assist in locating a device.
A company uses cell phones that do not have SIM cards and can only be managed by a specific network provider. The company wants to buy 4G cell phones with SIM cards for voice calls so they can switch to any chosen provider. What network type best suits the company’s needs?
A. LTE
B. GSM
C. CDMA
D. PRL
A. LTE
A. Long-term evolution (LTE) is a packet data communications specification providing an upgrade path for both GSM and CDMA cellular networks. LTE Advanced provides 4G standard network access with SIM cards. Most 4G networks have moved to LTE.
Other options
B. Global System for Mobile Communication (GSM) allows subscribers to use a removable subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.
C. Code division multiple access (CDMA) means that the provider directly manages the handset and there is no removable SIM card.
D. A preferred roaming list (PRL) provides the information that the cellular radio needs to connect to the network and a user can trigger an update to the list in the device’s settings or by dialing a code.
A Windows-based laptop has an internal battery that requires tools to access and remove. What steps must a repair technician take prior to opening the laptop to install a replacement? (Select all that apply.)
A. Discharge the battery.
B. Power the laptop off.
C. Disconnect the AC power.
D. Charge the battery.
B. Power the laptop off and C. Disconnect the AC power
B. Before inserting or removing any battery pack, it is recommended and best to turn the machine off. This will prevent issues with the operating system and is a best practice for safety.
C. When working on a laptop to replace any physical component, it is recommended to unplug the laptop from the AC wall outlet for safety purposes.
Other options
A. Discharging a battery will drain what available charge remains. This is not a required step when replacing a laptop battery.
D. Charging a battery will provide the battery with the maximum amount of power the battery can maintain. Charging the battery is not required.
A warehouse user reports an issue with a laptop to the IT helpdesk. The issue is that the laptop becomes very hot after only a few minutes of use whether it is plugged in or not. The user states that laptop use is under the usual circumstances. What does IT conclude the likely problem to be?
A. Faulty AC adapter
B. Battery discharging
C. Dust and debris
D. Room temperature
C. Dust and Debris
Dust trapped in laptop cooling vents acts as an insulator and can prevent proper cooling. It can also slow or stop the fan. The vents are likely the issue due to the warehouse environment.
Other options
A. A faulty AC adapter can cause a number of issues with a laptop. However, in this case, the problem exists even when the laptop is not plugged in.
B. A battery discharging can cause a laptop to feel warm or hot, however, in this case, the temperature is out of the norm.
C. The room temperature can impact the operating temperature of a device. In this case, the user reports no out-of-the-ordinary circumstances.
A user notices that a smartphone is not functioning properly as internal diagnostics show a majority of the RAM being used continuously with certain applications. What symptom should a technician look for?
A. Power drain
B. Resource usage
C. Data usage
D. Malware activity
B. Resource usage
Poorly coded apps and malware can cause high resource usage which potentially leads to overheating problems for a device.
Other options
A. Rogue or poorly developed apps can become unresponsive and might not shut down properly when closed. This can often cause a power drain on a device.
C. Data usage means that the device has reached a data transmission limit or over-limit unexpectedly. Most devices have an option to monitor data usage.
D. Malware can be a problem on mobile devices. Malware activity is a cause for problems but is not the symptom of problems.
A user would like to take advantage of biometric technology for a quicker and more secure login to a laptop. The user discovers the laptop has no built-in technology for biometrics. What solution does the IT department offer?
A. Near-field scanner
B. USB peripheral device
C. Keyboard replacement
D. Touchpad replacemen
B. USB peripheral device
If a laptop does not have an integrated fingerprint scanner, it is possible to obtain models that connect to a universal serial bus (USB) port. An external webcam may also be used.
Other options
A. A near-field communication (NFC) scanner on a laptop is primarily used to pair peripheral devices or to establish a connection to a smartphone.
C. A keyboard on a laptop can be replaced. In this case, a replacement will not suffice. A fingerprint reader is a separate component.
D. A touchpad on a laptop can be replaced. However, a touchpad is a separate internal component from a fingerprint reader.