Test 3 16-18,20 Flashcards
Most android apps are weird. Using ______\ using the Android software developer kit
Java
WhT are the names of the app stores for iOS and Google Android devices
Google Play
Apple store
A device used in mobile devices to sense the physical position of the device
Accelerometer
An area where access to Wi fi is made available such as at a coffee shop, retail store, or airport
Hotspot
A device that contains a disc that is free to move and can respond to gravity as device is moved
Gyroscope
Based on Mac OS X and is currently used on the iPhone IPad and iPod touch by Apple
iOS
A feature that uses Bluetooth to detect t nearby compatible devices then creates a peer to peer network using a WiFi signal between the devices.
AirDrop
Allows a task to be started on a device such as an iPad and the. Pick up that task on another device.
Handoff
A unique number that identifies a cellular subscription for a device or subscriber along with its home country and mobile network.
IMSI
A unique number that identifies each mobile phone or tablet device worldwide
IMEI
The process of connecting with another Bluetooth device
Pairing
What software programming languages can be used for an iOS app
C++
C
Objective-C
For iOS a ______ reset is a full shutdown of the device
Hard
The iOS operating system utilizes a closed source or vendor specific commercial license. True or False
True
______ is the process of obtaining administrative privileges to an Android device
Rooting
A database file called the _______ contains the preferred service providers or radio frequencies a mobile carrier wants a device to use.
Preferred Roaming List
Where is the favorites tray on an Android Device
Above the Action Bar
A setting called airplane mode lowers the output power of the WiFi and Bluetooth antennas allowing these networks to function but at a reduced range. True or False
False
What must you do before using a new IPad or IPod touch
Activate it
CDMA carriers are likely to require that a cellular device have a ________ which is a small card similar to a SIM card
Removable User Identity Module
Outgoing mail is normally sent using what mail delivery protocol?
SMTP
What name is given to Windows 8.1 virtual assistant?
Cortana
What is the more secure alternative to the SMTP protocol?
S/MIME
Windows phones rely primarily on the ______ screen for accessing apps
Start
The official source for Android apps is called the Android ______ at play.google.com
Marketplace
A factory reset erases all data and restores a device to factory default state. True or False
True
Like desktop computers a mobile device can be configured to communicate information securely over a —————- network connection
Virtual private
A SIM card is used for what?
Holding data related to your cellular carrier
What identifies a SIM card if the card is used?
ICCID
Each android version is named after a what?
Dessert
Android offers a ________ for troubleshooting OS and device issues
Safe mode
For iOS a ________ reset puts the device in hibernation and then restarts the device
Soft reset
For Android a ______ reset aka factory reset restores the device to factory default state.
Hard reset
What port is utilized by secure IMAP
993
All parts of an adroit application are published as package of files wrapped into one file utilizing a what file extension?
.apk
A process called _________ allows users to download software from sources other than Apple
Jail breaking
Developers can write apps for iPhone but these apps must be sent to Apple for their close scrutiny. True or false
True
iOS was developed by and continues to be maintained by a consortium of companies. True or false
False
What company acquired android code in 2005?
Up to _____ apps can be pinned to favorites tray on Android phones.
7
Sprint and t mobile offer a feature called WiFi ________ which uses voIP over a WiFi connection to the internet.
Calling
For Android a _____ reset is power cycling the device
Soft
A Bluetooth pin code requires the entry of a pin that is how many digits in length?
Four
The Fire OS used by Amazons kindle fire device is based upon ______ and is deeply customized to meet the needs of Amazons e reader audience.
Android
________ your computer can use a phones cellular network connection to access the internet.
Tethering
Android apps are sold or freely _______ from any source or vendor
Distributed
What is the accelerometer used for in mobile devices?
Adjusting the screen orientation
Siri is an example of what technology?
Virtual assistant
What are two most popular web server applications?
IIS and Apache
Which of the following is described as a computer that intercepts requests that a browser makes of a server and can cache received content.
Proxy server
To which group does windows give access to folders that you create which are not part of your user profile?
Authenticated users
The easiest method to start a remote assistance connection but only works if both computers used for the connection support the feature.
Easy Connect
If you want to share a folder but don’t want others to see it add a ____ to the end of the folder name
$
The authentication server stores user or device ______ such as usernames and passwords.
Credentials
Remote _______ gives a user access to a windows desktop from anywhere on the internet.
Desktop
Group policy is available in all versions of Windows. True or false
False
Internet explorer tab used to delete browsing history
General
Internet tab that set zone settings
Security
Internet explorer tab that blocks cookies
Privacy
Internet explorer tab that sets up parental controls
Content
Internet explorer tab that sets up proxy server settings
Connections
Internet explorer tab that manages add ones
Programs
Internet explorer tab that reset settings to default
Advanced
Windows 10 features what new web browser which is designed to replace internet explorer
Microsoft edge
If a windows computer belongs to a _______ all security is managed by the network administrator for the entire network.
Domain
An ________ is a small app or add on that can be downloaded from a web site long with a web page and is executed by IR to enchanted the web page. A ______ can sometimes hide in these but IE is designed to catch them by authenticating each it downloads
ActiveX Control
Virus
When a user logs onto a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected. True or false
False
The principle of _________ approach means a user account assigned to a computer user should have enough rights to perform his or her job no more.
Least privilege
A ________ cloud has devices established on an organizations own servers established virtually for a single organizations use.
Private cloud
Which NTFS permissions should you assign if the user should be able to create folders and files and open files to read data but not delete files.
Read, Write
To use Remote Desktop the computer you access remotely can be running Windows 8 home or professional. True or false
False
Rights refer to the ______ an account is allowed to do in the system
Tasks
________ services have reporting policies in place to ensure transparency between customers and vendors
Measured
__________ is the technology used in Windows to create a data source which provides access to a database and includes the drivers required to interact between applications and data
Open database connectivity
If both share and NTFS permissions are used the least restrictive permission between the two applies. True or false
False
Use _____ console in business and professional editions of Windows to create and manage your own user groups.
Computer Management
When attempting to access a remote computer on which your user name and password do not exist what user group will you be placed in?
Anonymous users
If NTFS permissions conflict between a user and group the least restrictive permission applies. True or false?
True
User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?
Guest group
Which of the following is true about user data folders with in a workgroup
Private data for each user should be kept in their C:\Users folder
The _______ tab in Windows IE can be used to control pop up blocker
Privacy
In a _______ cloud services are provided over the internet to the general public
Public
Rapid ________ refers to a services ability to be scaled up or down as need level changes for a customer
Elasticity