Chapter 18: Mobile Devices

1. C. There is no requirement of either operating system that the devices they are on have cellular calling capability.

2. B. Google Play used to be called the Android Market. The App Store is Apple’s equivalent.

3. A. Three gyroscopes are used to detect roll, pitch, and yaw. The problem is with the gyroscope that detects yaw. The accelerometer would be suspect if the iPhone were not detecting flat movement to the side or forward and backward. The magnetometer can only help with compass headings and the GPS with geographical positioning.

4. B. Resistive touchscreens require pressure to actuate them, while capacitive ones do not and instead can be actuated by the fleshy part of the human finger. Body oils, moisture, and dirt are not as detrimental to the effectiveness of resistive screens as they are to capacitive screens.

5. A, E. SMS is the most widely supported text-messaging service, across all platforms and service providers. Apple’s iMessage is a proprietary service that does not require cellular access to send text messages.

6. D. Whenever you have a reliable WiFi signal available that you do not pay for as you go, you should feel free to disable your cellular access to data networking. The wireless network is often faster and does not cost you anything to use. If data networking works better when you leave the cellular network available to fall back on, you can choose to disable it only for certain large downloads or disable it completely until the download is complete. Phone calls will continue to be sent out over the cellular network. This does not imply that your data is not using an available WiFi connection. Therefore, unless you are particularly sensitive to the situation or know that data is going out over your cell access, you might not need to disable the cellular data networking feature.

7. C. The range of Bluetooth connections is considered short compared to WiFi connections. Bluetooth is a fully standardized protocol that supports file transfers using FTP. Rebooting, or even restarting, paired devices is not a requirement for Bluetooth connection.

8. A. SMTP sends mail to the server at TCP port 25. POP3 uses port 110. IMAP4 uses 143, and port 995 is used by POP3 securely over SSL or TLS.

9. B. SMTP with TLS uses port 587 by default. With SSL, SMTP uses port 465. IMAP4 with SSL/TLS uses port 993, while POP3 with SSL/TLS uses port 995.

10. A. All of these options can be used to set a passcode on an Android mobile device except speaking a passphrase.

11. C. The fact that the iPhone is attached to the computer with which it last synced indicates that the owner is likely in possession of it. Servicing the phone is not required, and performing an Apple reset will still have you locked out as a security precaution.

12. D. Locator applications tend to leave reporting thefts to the user. Because not all losses are due to theft and because the user would need to determine the authorities to contact, this feature is not seen in such applications. The location information can certainly be relayed to the authorities. These applications tend to allow messages to be displayed on the device’s screen as well.

13. A. Software Update is a selection found under Settings > General in the iOS. There is no Security menu per se, although keeping your iOS updated is considered a proactive security measure.

14. D. You should not count on being able to do anything that involves opening the device. Many tablets and phones offer options for printing wirelessly, sometimes with the purchase of additional software or hardware to assist.

15. A. Multi-touch is the feature that allows pinch-to-zoom technology. Spreading your fingers apart zooms in, while pinching your fingers together zooms out. TouchFLO is the HTC technology that features multiple screens that you can flip between. SuperPinch does not exist, and as unpopular an idea as it may seem, even resistive touchscreens are technically capable of multi-touch.

16. B, D, F. The items most often able to be synchronized are contacts, apps, email, photos, music, and videos.

17. D. You can install iTunes on the supported x86 versions of Windows as well.

18. B. Mail access uses standard secure or insecure TCP ports, not UDP ports. Exchange access to such mail services is not unheard of, but it is exceedingly rare. Mobile devices tend to have email clients built in.

19. C. The GPS transceiver, WiFi connection, and cellular network are used to home in on the geographical location of a missing mobile device.

20. A. Most modern devices use a solid-state drive (SSD), called internal storage, instead of a traditional magnetic drive to store permanent information. Memory cards can often be used to augment the SSD’s storage capacity.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.101.178