IT Essentials v6.0 Chapter 10 Practice Quiz Answers

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

IT Essentials v6.0 Chapter 10 Practice Quiz Answers
Rate this post

IT-Essentials v6.0 Chapter 10 Practice Quiz Answers

1. What are two types of cloud-enabled services for mobile devices? (Choose two.)

locator apps*
screen app locking
remote backup*
passcode configuration
screen calibration

Explanation:
Locator apps and remote backup are two types of cloud-enabled services for mobile devices. Passcode configuration, screen calibration and screen app locking are performed on the device directly by the user, not as a cloud-enabled service.

2. What two sources of information are used to enable geocaching, geotagging and device tracking on Android and iOS devices? (Choose two.)

GPS signals*
cellular or Wi-Fi network*
images of the environment from the integrated camera
the relative position to other mobile devices
the user profile

Explanation:
Mobile devices are frequently fitted with a GPS radio receiver, enabling them to calculate their position. Some devices do not have a GPS receiver. Instead, they use information from Wi-Fi and cellular networks.

3. Which feature of an Android or iOS mobile device helps prevent malicious programs from infecting the device?​

Mobile device apps are run in a sandbox that isolates them from other resources.*
The phone carrier prevents the mobile device app from accessing some smartphone features and programs.
The remote lock feature prevents malicious programs from infecting the device.
The passcode restricts the mobile device app from access to other programs.

Explanation:
Because mobile device apps do run in a sandbox (an isolated location) it is difficult for malicious programs to infect the device. The passcode and remote lock features secure the device against unauthorized use. The carrier may disable access to some features and programs based on the service contract, but this a commercial, not a security, function.

4. What two preventive maintenance tasks should be scheduled to occur automatically? (Choose two.)

executing a backup*
scanning the signature files
checking the disks for bad sectors*
updating the operating system software
resetting devices by applying the factory reset feature

Explanation:
To avoid the loss of irreplaceable information, it is critical that regular backups be executed and that the hard drives be checked regularly. The signature files are scanned constantly by antimalware software. Updating the OS should happen when necessary but should not occur automatically. Because the factory reset of a device deletes all settings and user data, a factory reset should only be done if a major issue requires it.

5. Which email protocol used by mobile devices allows pictures and documents to be included in email messages?

IMAP
SMTP
MIME*
POP3

Explanation:
The IMAP protocol allows email data to be synchronized between a client and server. Changes made in one location, such as marking an email as read, are automatically applied to the other location. POP3 is also an email protocol. However, the data is not synchronized between the client and the server. SMTP is used for sending email, and is typically used in conjunction with the POP3 protocol. MIME is an email standard that is used to define attachment types, and allows extra content like pictures and documents to be attached to email messages.

6. What are two features of the Android operating system? (Choose two.)

Each implementation of Android requires a royalty to be paid to Google.
Android has been implemented on devices such as cameras, smart TVs, and e-book readers.*
All available Android applications have been tested and approved by Google to run on the open source operating system.
Android is open source and allows anyone to contribute to its development and evolution.*
Android applications can only be downloaded from Google Play.

Explanation:
As an open source operating system, Android allows anyone to contribute to the development and evolution of compatible software. Android has been implemented on a wide range of devices and platforms including cameras, smart TVs, and e-book readers. Royalties are not payable to Google, and Google has not tested and approved all available Android applications. Android applications are available from a range of sources.

7. Which two terms describe unlocking Android and iOS mobile devices to allow users full access to the file system and full access to the kernel module? (Choose two.)

patching
jailbreaking*
remote wipe
sandboxing
rooting*

Explanation:
Rooting and jailbreaking are the terms that describe unlocking Android and iOS mobile devices to grant users full access to the file system and full access to kernel modules. Remote wipe, sandboxing, and patching are examples of mobile operating system features and functions that are related to device security.

8. Which statement describes the Airplane Mode feature found on most mobile devices?

It allows the device to roam from one cellular network to another.
It automatically lowers the volume of the audio output from the device.
It turns off cellular, Wi-Fi, and Bluetooth radios on the device.*
It locks the device so that it cannot be used by someone else if it is lost or stolen.

Explanation:
Most airlines do not permit wireless devices to be used during takeoff and landing in case it interferes with airplane systems. Most mobile devices have a setting called Airplane Mode that turns off the Wi-Fi, cellular, and Bluetooth radios while leaving all other functions enabled. This allows a mobile device to be used on an airplane or anywhere else where data transmissions are not permitted.

9. What three tasks can be done with the iOS device Home button? (Choose three.)

respond to an alert
return to the home screen*
wake the device*
display the navigation icons
open audio controls*
place apps into folders

Explanation:
The physical Home button on an iOS device can perform many functions depending on how it is used. Pressing the button while the device screen is turned off will wake the device. While an app is in use, pressing the Home button will return the user to the Home screen. Double-pressing the Home button while the screen is locked will show the audio controls, which makes it possible to adjust music volume without entering a passcode to enter the system.

10. Refer to the exhibit. Which expression best describes the pattern that is shown?

a 3D pattern that helps visually impaired users
the camera calibration pattern of a mobile device
a standard bar code that indicates the price of an app
a Quick Response code, which may represent a link to a download or web site*

Explanation:
A Quick Response (QR) code is a type of bar code that is designed to be scanned by the camera of a mobile device. The code can contain a variety of information such as links to web sites and links to automatic app downloads.

11. How is the representation of apps in the Windows Phone operating system interface different from the representations used in Android and iOS?

Windows Phone uses badges that indicate the system resources used by each app.
Windows Phone uses widgets that, when deleted from the Start screen, also delete the associated app.
Windows Phone uses buttons that must be tapped before an app can be seen.
Windows Phone uses rectangles that can display active content and that can also be resized.*

Explanation:
In the Windows Phone interface, apps are represented by tiles. Tiles are not only short cuts to an app. They can display active content and they can be resized to unclutter and visually organize screens.

12. True of False?
Android and OS X are based on the Unix operating system.

false
true*

Explanation:
Both the OS X and Android operating systems use the Unix operating software as a base.

13. Which term is used to describe the process of establishing a connection between any two Bluetooth devices?

matching
syncing
pairing*
joining

Explanation:
During the pairing process, a Bluetooth device is set to discoverable mode so as to be detected by another Bluetooth device. Also, a PIN may be requested as part of the pairing process.

14. A person with an Android mobile device holds down the power button and the volume down button until the device turns off. The person then turns the device back on. What was this person doing to the device?

a full backup to the iCloud
a standard reset of the device*
an operating system update
a normal power off
a factory reset

Explanation:
If a problem occurs with an Android device that cannot be solved with a normal power off and on, a user can try a reset of the device. Holding the power button and the volume down keys until the device powers off and then powering it on is one of the ways to reset most Android devices.

15. Match the Linux CLI commands to their function. (Not all options are used.)

rm      —->  removes files
man   —->  displays the documentation for a specific command
ls        —->  displays the files inside a directory
cd      —->  changes the current directory
mkdir —->  creates a directory under the current directory

Explanation:
man – displays the documentation for a specific command
ls – displays the files inside a directory.
cd – changes the current directory
mkdir – creates a directory under the current directory
cp – copies files from source to destination
mv – moves files to a different directory
rm – removes files

Leave a Reply

Time limit is exhausted. Please reload the CAPTCHA.

This site uses Akismet to reduce spam. Learn how your comment data is processed.