Mobile Devices Flashcards

1
Q

A _______ is a lightweight, compact, battery-powered computer. It’s primary goal is to have the same functionality as a desktop computer, but in a portable format.

A

laptop or notebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With _______, the hard drive contains a system of accelerometers that are able to detect sudden movements or vibrations, which indicate an impact is going to occur.

A

active hard drive protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To become more compact, laptops have shifted toward an _________. This means that a lot of the laptops internal hardware is manufacturer-specific and contains mostly integrated parts including integrated graphics, network cards, and sound cards.

A

integrated proprietary model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ were used in original laptops. They are susceptible to damage from overcharging and suffer from a problem known as the memory effect, which occurs when the battery is recharged at the same point over and over again.

A

Nickel-Cadmium or NiCad battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ are impossible to overcharge, and have low self-discharge rate.

A

Lithium-ion battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ______ is the notebook’s mouse. It uses technology similar to a touch screen to detect finger movements and move the cursor. It also has a left and right button for left-click and right-click actions.

A

track pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you press a button while holding the ______ key, the key will perform the secondary _______ denoted by the icon. Some have ______ keys to control movie or audio playback.

A

function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Some notebooks have a toggle switch to manually enable and disable the ______. The purpose is to completely turn off the wireless card to conserve battery power.

A

wireless network card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What laptop features allows users to interact with the laptop while walking?

A

rotating or removable screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _______ can quickly connect a laptop to an external monitor, keyboard, and other peripherals as well as charge the battery.

A

laptop docking station

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ______ pad is used in Tablet PCs to receive input. Input is written onto the pad with a stylus pen and the motions are transferred into data that is processed by the system.

A

digitizer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the 172-pin DIMM often used in laptops?

A

MicroDIMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unlike desktop computers that use 3.5 inch hard drives, most notebooks use ______ hard drives.

A

2.5 inch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unlike desktop computers that use individually connected cables for components, notebooks hard drives slide into the ______ and the power and SATA connections are made.

A

drive bay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Before working with any device, especially notebooks, it’s important to consult the device’s _________ to familiarize yourself with its features and specifications.

A

documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

While most notebooks use 2.5 inch hard drives, some small form factor notebooks use 1.8 inch hard drives. Some notebooks use ________ that cant be replaces or upgraded.

A

integrated solid state memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Notebooks have _______ that line up with the hard drive’s connectors, making swapping drive very easy.

A

stationary connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Adding more _______ to a notebook is probably the most cost effective way to increase a notebook’s performance.

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If the notebook supports ________ memory, as most do, you need to install paired memory to gain benefits of _______ speeds.

A

dual-channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

______ parts are the components used by the manufacturer when building the original product, are usually purchased directly from the manufacturer of the notebook.

A

Original Equipment Manufacturer (OEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The _____ encases the LCD screen and holds it in place.

A

bezel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Older laptops used LCDs that had _______ back lighting. The ______ in these screens used an inverter to convert DC power into the AC power used by the fluorescent tubes.

A

CCFL (Cold Cathode Fluorescent Lamp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where is the wireless antenna usually located on notebooks?

A

Around the bezel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When installing memory, align the notch on the long side of the memory module, insert the memory pins into the slot at a ______ angle, rotate the module by pressing down until the side hold-down clips snap into place.

A

45-degree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Laptop hard drive’s _____ is important. Most use either 1.8 inch or 2.5 inch ______ standard

A

form factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of network card is used for internal wireless adapters in notebooks?

A

Mini-PCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An internal laptop keyboard is generally connected connected to the laptop’s system board using a ______.

A

ribbon cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The two main problems encountered with _______ are a burnt out CCFL or a malfunctioning inverter.

A

LCD backlights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

______ is an old power management tool that’s rarely used. With _____, the BIOS was responsible for controlling hardware.

A

APM (Advanced Power Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

______ is the operating system that desktop and notebook systems use. With ______, hardware configuration settings are only controlled by the operating system.

A

ACPI (Advanced Configuration and Power Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

With _______, the operating system receives real-time statistics about how much power each hardware component is using. Then it uses this information to decide whether it should leave it alone, reduce the amount of power it’s consuming, or shut down entirely.

A

OSPM (Operating System-directed configuration and Power Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The first ACPI power state is ______. You can use the entire system, and hardware not in used can enter lower power state to save energy.

A

Working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The second ACPI power state is ______. This lets the system switch from a low-power state to a high-power state quickly so it can respond to hardware or network events.

A

Standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The third ACPI power state is _____. When in this state, it looks like the system is off, but volatile memory is refreshed, and components remain powered so the computer can quickly wake up when it receives input from the keyboard, LAN, or a USB device.

A

Sleep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Desktops have a mode called _______, where the system uses a hibernation file to save the system state in case there’s a power outage.

A

Hybrid Sleep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The fourth ACPI power state is ______. The system appears to be off, and power consumption is reduced to the lowest level. Volatile memory is saved to a hibernation file to preserve the system state. The computer can wake from input from the keyboard, LAN, or a USB device, and the working context is restored if it’s stored in nonvolatile media.

A

Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The fifth ACPI power state is ______, where the system appears to be off and the state is comprised of a full shutdown and boot cycle.

A

Soft Off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The last ACPI power state is ______, where the system is completely off and consumes no power, and it only returns to a working state after a full reboot.

A

Mechanical Off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What battery type does not develop a memory, and has 40% longer lifetime, greater charge capacity, less toxic and slightly more expensive than nickel cadmium?

A

Nickel Metal Hydride (NiMH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What battery type is a growing technology that is still developing, not a true battery, offers instant power and uses replaceable cartridges, and rather than being recharged it is replaced?

A

Fuel cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

______ contain dangerous and regulated chemical. Always dispose of them according to the manufacturers directions. Disposing of ______ improperly might be illegal.

A

batteries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What ACPI power state retains the contents in RAM, but turns all other components off?

A

suspend/sleep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

______ power state saves everything in RAM to the hard drive. You’ll need as much free disk space as you have RAM

A

Hibernation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

If you press a key down and it doesn’t come back up, or you have to push down really hard to get the key to depress all the way, you have a _________.

A

sticky key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Notebook _______ tend to collect debris over time such as dead skin, oil, and spilled liquid. To keep it functioning properly, you should clean it regularly.

A

touchpad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A ______ could be caused by misconfigured touchpad sensitivity settings, or a malware infection. It moves around on its own and may click on random things.

A

ghost cursor

47
Q

When the cursor moves across the screen on its own, with or without touching the touchpad, it’s known as ______. The drivers for the touchpad may be outdated or corrupt.

A

cursor drift

48
Q

The AC adapters used with the notebook systems tend to fail after a few years. You can verify this by testing the DC side of the adapter with a ______.

A

voltmeter

49
Q

The most common mobile device is the _______. It combines the functionality of a cellular phone with the features of a desktop computer.

A

smartphone

50
Q

______ were some of the first type of handheld mobile devices. They typically have more computing power than smartphones, but are larger and more expensive. They were designed to replace notebooks since they are portable, have long-lasting battery, and have a lot of the same productivity tools.

A

Tablets

51
Q

A ______ is a hybrid between smartphones and tablets. They are able to use stylus pens to interact with the device, which allows for more accurate screen tapping for things like writing notes, drawing diagrams, or navigating apps.

A

phablet

52
Q

_______ are a family of mobile devices that are meant to be worn on the body. Most are designed to interface with another device.

A

wearables

53
Q

______ primary purpose is for reading digital books, newspapers, magazines, and other periodicals. Most use E Ink to display digital content.

A

E-readers

54
Q

______ is a special technology that creates a high-contrast black-and-white display. ______ screens consume less power that LCD screens and don’t suffer from visibility problems in bright sunlight.

A

E Ink

55
Q

A lot of mobile devices have expandable storage in the form of _______. This allows mobile devices to increase their storage to upwards of 200 gigabytes.

A

microSD card

56
Q

Mobile devices have internal sensors that collect environmental data. One example is a ______, which calculates the devices location information. This is helpful for navigation and device location services.

A

GPS chip

57
Q

A ______ is a sensor that detects movement on a single plane, typically a horizontal plane. It detects when a mobile device is turned sideways and tells the devices to change the screens orientation. It’s also called a g-sensor.

A

accelerometer

58
Q

A _______ detects movement, but instead of on a single plane, it detects horizontal and vertical movement. It’s useful for apps that require you to tilt your phone or tablet.

A

gyroscope

59
Q

Mobile devices use ______ to receive user input. They use these since they are able to detect multiple contact points. One drawback is they require a conductive object to touch the screen, so a gloved hand wont be able to manipulate the screen.

A

capacitive touchscreens

60
Q

The 3 most common mobile operating systems are _____, ______, and ______.

A

Android, iOS, and Windows Phone

61
Q

_____ are camera and microphone systems that allow users to communicate through the internet with audio and video.

A

Webcams

62
Q

The _____ architecture is compatible with standard ______ PC hardware and software, which allows the device to run operating systems such as Windows.

A

x86

63
Q

Some tablets, such as the iPad, use the ______ architecture. Its more power-efficient and less expensive to manufacture than x86, and primarily runs Android on it.

A

ARM

64
Q

An __________ system is a method of facilitating one-way message broadcasts to one or many groups of people, alerting them to a pending or existing emergency,

A

emergency notification system

65
Q

_______ is the ability to identify a person’s current physical location by obtaining GPS data from their smart phones or other GPS-enabled devices.

A

Geotracking

66
Q

_______ is a space-based navigation system that provides location and time information in all weather conditions anywhere on or near the Earth where there is an unobstructed line of sight to four or more _______ satellites.

A

Global Positioning System (GPS)

67
Q

_____ is a unique number given to every single mobile phone. It is typically located behind the battery. It’s connected to a GSM network and is stored in the Equipment Identity Register database containing all valid mobile phone equipment.

A

IMEI (International Mobile Equipment Identity)

68
Q

______ is a unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. It’s a piece of information stored on the SIM card.

A

IMSI (International Mobile Subscriber Identity)

69
Q

______ is the name for the part of the GUI that lets users customize the home screen, start mobile apps, make phone calls, and perform other tasks on Android devices.

A

Launcher

70
Q

The ______ is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and the user. Its a level of services assigned by the ISDN.

A

Primary Rate Interface (PRI)

71
Q

The _______ is a database residing in a wireless device that contains information used during the system selection and acquisition process. Without it, the device may not be able to roam.

A

Preferred Roaming List (PRL)

72
Q

_______ controls basic low-level functions like network connectivity, Wi-Fi, and GPS.

A

Radio firmware

73
Q

A ______ is a set of software development tools that allow the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, OS, or similar.

A

software development kit (SDK)

74
Q

_______ is the package file format the Android OS uses to distribute and install mobile apps and middleware.

A

Android application package (APK)

75
Q

______ networks were the first to offer digital data services. _____ speeds are slow (14.4 Kbps) and are used mainly for text messaging, not internet connectivity.

A

2G or second generation

76
Q

______ is the first cellular technology to be truly internet-compatible, with speeds of 400-1000 Kbps.

A

EDGE or 2.75G

77
Q

______ offers simultaneous voice and data. Minimum speeds for stationary users are quoted at 2 Mbps or higher.

A

3G or third generation

78
Q

HSPA+, also known as _____, uses MIMO. It significantly increases data throughout and link range without additional bandwidth or increased transmit power.

A

smart antenna

79
Q

______ and _____-Advanced increase downlink/uplink speeds to 100/50 Mbps and 1 Gbps/500 Mbps.

A

Long Term Evolution (LTE)

80
Q

_____ is available with minimum speeds around 3-8 Mbps with over 100 Mbps possible. It uses MIMO, requires new equipment for the consumer, and utilizes WiMAX.

A

4G or fourth generation

81
Q

_______ delivers high-speed internet service (up to 1 Gbps for stationary users) to large geographical areas.

A

Worldwide Interoperability for Microwave Access (WiMAX)

82
Q

______ is able to achieve speeds twenty times faster than 4G; its peak speed is 20Gb per second, uses MIMO, includes lower frequencies down to 600 MHz, and uses LTE for wireless connections.

A

5G or fifth generation

83
Q

A _____ is a physical location where you can obtain wireless internet access using a wireless local area network (WLAN) with a router connected to an internet service provider.

A

hotspot

84
Q

_______ is connecting one device to another; it allows sharing the internet connection of the phone or tablet with other devices like laptops. Can be done wirelessly over LAN, over Bluetooth, or physically using a cable like USB.

A

Tethering

85
Q

_______ is a setting available on many mobile devices that suspend the devices radio-frequency signal transmitting functions, which disables telephone, Wi-Fi, and Bluetooth.

A

Airplane mode

86
Q

A _______ provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.

A

mobile virtual private network (VPN)

87
Q

______ is a proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector.

A

Lightning

88
Q

______ is a process or technology where both entities in a communications link authenticate each other.

A

mutual authentication or two-way authentication

89
Q

______ is a protocol used to encrypt emails. It allows the sender to digitally sign and encrypt emails. An encrypted email server will encrypt email communications between the server and an email client, but will store the email in an unencrypted form.

A

S/MIME (Secure/Multipurpose Internet Mail Extensions)

90
Q

_____ is an email protocol that downloads and deletes emails from a mail server.

A

POP3 (Post Office Protocol v3)

91
Q

______ is an email protocol that can be used to synchronize email between multiple email clients on multiple devices.

A

IMAP (Internet Message Access Protocol)

92
Q

____ can be enabled so email is encrypted on a mobile device.

A

SSL or Secure Socket Layer

93
Q

By default, most mobile devices are configured to use a _________. This means that anyone can unlock the device with a simple swipe of the screen, which isn’t very secure.

A

swipe lock screen

94
Q

With _________, the index finger of the user is scanned and used to unlock the device.

A

fingerprint recognition

95
Q

With __________, the device’s camera is used to scan the user’s face and unlock the device.

A

facial recognition

96
Q

Probably the most common lock screen authentication method is using a _____. The user need to enter the correct four numbers in order to unlock the mobile device.

A

PIN

97
Q

With ______, the user creates a line pattern on a nine-point grid.

A

pattern unlock

98
Q

_______ uses a user-defined password to unlock the device. It can be a mix of letters, numbers, and symbols.

A

Passcode authentication

99
Q

Most mobile devices are configured by default to allow only a set number of failed login attempts, which is usually _____. If more than _____ failed logins are attempted, the mobile device automatically wipes the entire contents of the device and resets it to the factory defaults.

A

10

100
Q

_______ prevents someone from accessing the stored information in any capacity. This means even if someone obtains a device and were somehow able to copy the content of the device, they wouldn’t be able to view any of the information.

A

Encryption

101
Q

With _______ encryption, only sections of the device’s storage that contain files are encrypted. It’s fast, but it doesn’t encrypt deleted files, which can be recovered using software.

A

partial device

102
Q

With _______ encryption, every sector of the device’s storage is encrypted, regardless of whether it is data or not. This protects the entirety of the device, including deleted files. It does require processing resources and will slow performance.

A

full device

103
Q

______ is used to remotely format a mobile device. IT’s a feature built in to a lot of mobile devices. In order to send a ______ command, the device needs to be powered on and have cellular or Wi-Fi connection.

A

Remote wipe

104
Q

A ________ allows the owner to locate a lost or stolen device. The owner can use a website or software application to identify the approximate location of the device on a map.

A

device location service/feature

105
Q

________ allow you to recover important business data and personal files from a lost, stolen, or broken phone. Most cellular providers offer some type of cloud backup service.

A

Remote backup applications

106
Q

An ________ is a specialized app that is pre-set by you to work with the service and provides a constantly rotating set of codes that you can use to utilize two-factor authentication or verification.

A

authenticator application

107
Q

_______ are those that have been reviews and approved by the device’s app service. This means the app if safe to install and does not contain malicious code.

A

Trusted apps

108
Q

_______ are those that have not been verified and approved by the app service. Most devices won’t allow these to be installed by default.

A

Untrusted apps

109
Q

Use a ______ to inspect network traffic and to allow or block traffic based on a set of rules.

A

firewall

110
Q

_______ tools allow for remote management of multiple mobile devices. An IT admin can test config settings before deploying them, create and enforce mobile device security policies, remote wipe mobile devices, and push OS updates to devices.

A

MDM (mobile Device Management)

111
Q

Jailbreaking or rooting a mobile device weakens its built-in security and can expose sensitive data to cyber-fraud. A best practice is to deny access to a secure network to any device that has been given __________.

A

unauthorized root access

112
Q

An _______ is a tool that can be used to identify problems with installed apps. It is important the list is always kept up-to-date.

A

App scanner

113
Q

________ are special apps that can be used to troubleshoot Wi-Fi connectivity issues. They identify the number of APs that are broadcasting, display the signal strength and channel of each wireless network, and obtain wireless network info.

A

Wi-Fi analyzer

114
Q

A ________ can be used to troubleshoot cellular network connectivity by displaying signal strength/interference, number of cell towers in the area, location of each cell tower, and mobile network info.

A

Cell Tower analyzer