ITE Chapter 10 Exam Answer 2018-Skipzen. This exam will cover material from Chapter 10 of the ITE 6.0 curriculum. This exam will be scored using the Weighted Model where each MCSA (Multiple-Choice Single-Answer) is worth two points and each MCMA (Multiple-Choice Multiple-Answer) is worth one point for each correct option.
ITE Chapter 10 Exam Answer 2018
Chapter 10 Exam
1. What are two ways that iOS differs from Android? (Choose two.)
iOS has a physical Home button, but Android uses navigation icons.
In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app.
2. What is a good source for safely downloading Android apps?
Google play
3.
Refer to the exhibit. What two statements are true about the operating system screen shown? (Choose two.)
The area that is highlighted contains navigation icons.
This is an Android screen.
4. A small number has appeared on one of the apps on a user's iOS home screen. What does this mean?
It is an alert badge that indicates the number of items requiring attention for that app.
5. What represents apps in the Windows Phone interface?
tiles
6. What is the name of the Windows Phone 8.1 digital, or virtual, assistant?
Cortana
7. What is Wi-Fi calling?
a way to make mobile phone calls over a wireless
data network.
8. What is a benefit of the WEA system?
It can save lives by sending emergency text messages to mobile phones.
9. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
to help prevent theft of private information
to prevent unauthorized use of the device
10. Which two conditions must be met for mobile device security measures such as remote lock
and remote wipe to function? (Choose two.)
The device must be powered on.
The device must be connected to a network.
11. Which two location data sources can locator apps use to determine the position of a
mobile device? (Choose two.)
cellular towers
WiFi hotspots
12. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)
The user interface can be extensively customized.
The operating system can be fine-tuned to improve the speed of the device.
13. Which statement is true about wireless connectivity on an Android mobile device?
When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.
14. In the context of mobile devices, what does the term tethering involve?
connecting a mobile device to another mobile device or computer to share a network connection
15. Which statement is true about industry standards for cellular networks
Cell phones that use a single standard can often only be used in specific geographic areas.
16. What will allow someone to use a cell phone for entertainment without connecting to any networks?
Airplane Mode
17. What technology enables a cell phone to be used as a hands-free device?
Bluetooth
18. A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?
IMAP
19. What is the code name used for the OS X 10.10 operating system?
Yosemite
20. What is a purpose of the boot manager program?
It allows the user to select the OS to use to boot the device.
21. What is the purpose of signature files used to secure mobile devices and operating systems?
They contain sample code from known viruses and malware that is used by security software to identify malicious software.
22. A file called new_resume has the following file permissions: rw-r-x-x What two facts can be determined from these permissions? (Choose two.)
Members of the group have read and execute access to the file.
The user is able to read and modify the file.
23. What is the result of doing a factory reseton a mobile device?
All user data and settings will bedeleted
24. What tool can be used on a mobile device to display available cellular networks, location of networks, and signal strength?
cell tower analyzer
25. An administrator is re-imaging a large number of Mac OS X machines. What built-in tool or command can be used to remotely boot the computers?
Netboot
26. What tool or command is used in the Mac OS X to navigate the file system?
Finder
27. What command is used to open a text editor in Unix-like systems?
vi
28. Both Linux and OS X devices have a service called ____that runs in the background and is responsible for executing scheduled tasks.
cron
ITE Chapter 10 Exam Answer 2018
Chapter 10 Exam
1. What are two ways that iOS differs from Android? (Choose two.)
iOS has a physical Home button, but Android uses navigation icons.
In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app.
2. What is a good source for safely downloading Android apps?
Google play
3.
Refer to the exhibit. What two statements are true about the operating system screen shown? (Choose two.)
The area that is highlighted contains navigation icons.
This is an Android screen.
4. A small number has appeared on one of the apps on a user's iOS home screen. What does this mean?
It is an alert badge that indicates the number of items requiring attention for that app.
5. What represents apps in the Windows Phone interface?
tiles
6. What is the name of the Windows Phone 8.1 digital, or virtual, assistant?
Cortana
7. What is Wi-Fi calling?
a way to make mobile phone calls over a wireless
data network.
8. What is a benefit of the WEA system?
It can save lives by sending emergency text messages to mobile phones.
9. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)
to help prevent theft of private information
to prevent unauthorized use of the device
10. Which two conditions must be met for mobile device security measures such as remote lock
and remote wipe to function? (Choose two.)
The device must be powered on.
The device must be connected to a network.
11. Which two location data sources can locator apps use to determine the position of a
mobile device? (Choose two.)
cellular towers
WiFi hotspots
12. What are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)
The user interface can be extensively customized.
The operating system can be fine-tuned to improve the speed of the device.
13. Which statement is true about wireless connectivity on an Android mobile device?
When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.
14. In the context of mobile devices, what does the term tethering involve?
connecting a mobile device to another mobile device or computer to share a network connection
15. Which statement is true about industry standards for cellular networks
Cell phones that use a single standard can often only be used in specific geographic areas.
16. What will allow someone to use a cell phone for entertainment without connecting to any networks?
Airplane Mode
17. What technology enables a cell phone to be used as a hands-free device?
Bluetooth
18. A technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?
IMAP
19. What is the code name used for the OS X 10.10 operating system?
Yosemite
20. What is a purpose of the boot manager program?
It allows the user to select the OS to use to boot the device.
21. What is the purpose of signature files used to secure mobile devices and operating systems?
They contain sample code from known viruses and malware that is used by security software to identify malicious software.
22. A file called new_resume has the following file permissions: rw-r-x-x What two facts can be determined from these permissions? (Choose two.)
Members of the group have read and execute access to the file.
The user is able to read and modify the file.
23. What is the result of doing a factory reseton a mobile device?
All user data and settings will bedeleted
24. What tool can be used on a mobile device to display available cellular networks, location of networks, and signal strength?
cell tower analyzer
25. An administrator is re-imaging a large number of Mac OS X machines. What built-in tool or command can be used to remotely boot the computers?
Netboot
26. What tool or command is used in the Mac OS X to navigate the file system?
Finder
27. What command is used to open a text editor in Unix-like systems?
vi
28. Both Linux and OS X devices have a service called ____that runs in the background and is responsible for executing scheduled tasks.
cron
:)
:(
=(
^_^
:D
=D
|o|
@@,
;)
:-bd
:-d
:p