Last Updated on October 26, 2019 by Admin
IT Essentials Chapter 10 Exam Online 2019
ITE -- Chapter 10
Quiz-summary
0 of 27 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
Information
ITE — Chapter 10
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 27 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- Answered
- Review
-
Question 1 of 27
1. Question
2 pointsWhat are two ways that iOS differs from Android? (Choose two.)Correct
Incorrect
Apple iOS devices have a physical Home button that has many uses. One of the uses of the Home button is navigation between screens. Android uses navigation icons instead of a physical Home button. In addition, much like a Windows OS, apps in Android are represented by icons that are shortcuts to the actual app. In iOS, the icons are the apps. Deleting an icon in Android deletes only the shortcut. However, the entire app is deleted from an iOS device when its icon is deleted.Hint
Apple iOS devices have a physical Home button that has many uses. One of the uses of the Home button is navigation between screens. Android uses navigation icons instead of a physical Home button. In addition, much like a Windows OS, apps in Android are represented by icons that are shortcuts to the actual app. In iOS, the icons are the apps. Deleting an icon in Android deletes only the shortcut. However, the entire app is deleted from an iOS device when its icon is deleted.
-
Question 2 of 27
2. Question
1 pointsWhat is a good source for safely downloading Android apps?Correct
Incorrect
Google Play ensures that the app is compatible with the mobile device and is a trusted source for apps.Hint
Google Play ensures that the app is compatible with the mobile device and is a trusted source for apps. -
Question 3 of 27
3. Question
2 pointsRefer to the exhibit. What two statements are true about the mobile operating system screen shown? (Choose two.)
Correct
Incorrect
The highlighted area shows the Android operating system navigation icons. From left to right they are Back, Home, and Recent Apps.Hint
The highlighted area shows the Android operating system navigation icons. From left to right they are Back, Home, and Recent Apps. -
Question 4 of 27
4. Question
1 pointsA small number has appeared on one of the apps on a user’s iOS home screen. What does this mean?Correct
Incorrect
Many of the apps on iOS devices are able to show an alert badge. An alert badge is displayed as a small icon over an app that contains a number that indicates the number of alerts from the app.Hint
Many of the apps on iOS devices are able to show an alert badge. An alert badge is displayed as a small icon over an app that contains a number that indicates the number of alerts from the app. -
Question 5 of 27
5. Question
1 pointsWhat represents apps in the Windows Phone interface?Correct
Incorrect
The Windows Phone OS uses tiles to represent apps. Tiles are rectangles that can display active content. When tapped, they open the associated app. Tiles can be resized to unclutter screens and to reflect the relative importance of the app.Hint
The Windows Phone OS uses tiles to represent apps. Tiles are rectangles that can display active content. When tapped, they open the associated app. Tiles can be resized to unclutter screens and to reflect the relative importance of the app. -
Question 6 of 27
6. Question
1 pointsWhat is the name of the Windows Phone 8.1 digital, or virtual, assistant?Correct
Incorrect
Siri is the well-known digital, or virtual, assistant that is available in iOS. Windows Phone also has a digitial assistant. It is called Cortana.
Hint
Siri is the well-known digital, or virtual, assistant that is available in iOS. Windows Phone also has a digitial assistant. It is called Cortana.
-
Question 7 of 27
7. Question
1 pointsWhat is Wi-Fi calling?Correct
Incorrect
Wi-Fi calling is a way that a mobile phone can use a wireless data network to make phone calls as if it were connected to a cellular network. In cases where cell phone coverage is inadequate, calls can be placed from places that have open Wi-Fi networks.Hint
Wi-Fi calling is a way that a mobile phone can use a wireless data network to make phone calls as if it were connected to a cellular network. In cases where cell phone coverage is inadequate, calls can be placed from places that have open Wi-Fi networks. -
Question 8 of 27
8. Question
1 pointsWhat is a benefit of the WEA system?Correct
Incorrect
The Wireless Emergency Alerts (WEA) system is a way that government agencies can send emergency alerts in the form of text messages to wireless device users. The WEA system can save lives by rapidly spreading alerts about man-made and natural disasters to many people in a short period of time. WEA can also be used to spread AMBER alerts regarding abducted children.Hint
The Wireless Emergency Alerts (WEA) system is a way that government agencies can send emergency alerts in the form of text messages to wireless device users. The WEA system can save lives by rapidly spreading alerts about man-made and natural disasters to many people in a short period of time. WEA can also be used to spread AMBER alerts regarding abducted children. -
Question 9 of 27
9. Question
2 pointsWhat are two purposes of the passcode lock feature on mobile devices? (Choose two.)Correct
Incorrect
The passcode lock feature on mobile devices helps prevent theft of private information and places the device into a power saving state. Personal data will not usually be erased from some mobile devices unless the number of failed passcode login attempts exceeds a threshold. Remote lock allows the device to be locked from a remote location. A factory reset returns the device to the original operation state when the device was first purchased. Various applications such as email or cloud storage can provide synchronization capabilities to be able to restore and re-synchronize information such as user data, contacts, and email on a mobile device.y other device features and actions.
Hint
The passcode lock feature on mobile devices helps prevent theft of private information and places the device into a power saving state. Personal data will not usually be erased from some mobile devices unless the number of failed passcode login attempts exceeds a threshold. Remote lock allows the device to be locked from a remote location. A factory reset returns the device to the original operation state when the device was first purchased. Various applications such as email or cloud storage can provide synchronization capabilities to be able to restore and re-synchronize information such as user data, contacts, and email on a mobile device.y other device features and actions.
-
Question 10 of 27
10. Question
2 pointsWhich two conditions must be met for mobile device security measures such as remote lock and remote wipe to function? (Choose two.)Correct
Incorrect
Successful mobile device remote security measures require the device to be powered on and connected to a network. The device passcode and GPS status do not affect the operation of remote security measures. Mobile devices run apps within a sandbox by default.Hint
Successful mobile device remote security measures require the device to be powered on and connected to a network. The device passcode and GPS status do not affect the operation of remote security measures. Mobile devices run apps within a sandbox by default. -
Question 11 of 27
11. Question
2 pointsWhich two location data sources can locator apps use to determine the position of a mobile device? (Choose two.)
Correct
Incorrect
In addition to GPS, mobile device locator apps can use cellular towers and WiFi hotspots to determine the position of a mobile device. The device sandbox, remote lock, or an app source (Play Store or iTunes) are other features and functions related to security and app downloading.Hint
In addition to GPS, mobile device locator apps can use cellular towers and WiFi hotspots to determine the position of a mobile device. The device sandbox, remote lock, or an app source (Play Store or iTunes) are other features and functions related to security and app downloading. -
Question 12 of 27
12. Question
2 pointsWhat are two potential user benefits of rooting or jailbreaking a mobile device? (Choose two.)Correct
Incorrect
Rooting or jailbreaking a mobile device usually enables extensive customization of the user interface and can enable performance enhancement. The three incorrect options are all considered potential risks to the user, the device, and the network that may result from rooting or jailbreaking a mobile device.Hint
Rooting or jailbreaking a mobile device usually enables extensive customization of the user interface and can enable performance enhancement. The three incorrect options are all considered potential risks to the user, the device, and the network that may result from rooting or jailbreaking a mobile device. -
Question 13 of 27
13. Question
1 pointsWhich statement is true about wireless connectivity on an Android mobile device?Correct
Incorrect
When joining a mobile device to a Wi-Fi network, it is always a good idea to ensure the network is secure using a protocol like WPA2. The user does not have to manually configure all of the settings to connect to a password-secured Wi-Fi network. The user will simply be prompted for the password the first time a connection is established. However, if the Wi-Fi network is not broadcasting an SSID, the device will need to be manually configured to connect to the network. If the device moves out of range of any known Wi-Fi networks, it will automatically switch over to use the cellular data network provided that the device has been pre-configured for this situation.Hint
When joining a mobile device to a Wi-Fi network, it is always a good idea to ensure the network is secure using a protocol like WPA2. The user does not have to manually configure all of the settings to connect to a password-secured Wi-Fi network. The user will simply be prompted for the password the first time a connection is established. However, if the Wi-Fi network is not broadcasting an SSID, the device will need to be manually configured to connect to the network. If the device moves out of range of any known Wi-Fi networks, it will automatically switch over to use the cellular data network provided that the device has been pre-configured for this situation. -
Question 14 of 27
14. Question
1 pointsIn the context of mobile devices, what does the term tethering involve?Correct
Incorrect
Tethering allows a laptop or PC to use the Internet connection of a mobile device such as a cell phone, usually through a cellular data connection. This allows devices to connect to the Internet in locations where there is no Wi-Fi or cabled connection, but where there is still a cellular data connection.Hint
Tethering allows a laptop or PC to use the Internet connection of a mobile device such as a cell phone, usually through a cellular data connection. This allows devices to connect to the Internet in locations where there is no Wi-Fi or cabled connection, but where there is still a cellular data connection. -
Question 15 of 27
15. Question
1 pointsWhich statement is true about industry standards for cellular networks?Correct
Incorrect
Cellular standards are not uniformly adopted around the world, so different geographic areas may use different cellular standards. Although some devices have the ability to work using multiple cellular standards, most devices are designed to work with a single standard, such as CDMA. These device will only work in areas where the cellular network has been deployed using that particular standard.Hint
Cellular standards are not uniformly adopted around the world, so different geographic areas may use different cellular standards. Although some devices have the ability to work using multiple cellular standards, most devices are designed to work with a single standard, such as CDMA. These device will only work in areas where the cellular network has been deployed using that particular standard. -
Question 16 of 27
16. Question
1 pointsWhat will allow someone to use a cell phone for entertainment without connecting to any networks?Correct
Incorrect
Airplane mode turns off all cellular, Wi-Fi, and Bluetooth radios.Hint
Airplane mode turns off all cellular, Wi-Fi, and Bluetooth radios. -
Question 17 of 27
17. Question
1 pointsWhat technology enables a cell phone to be used as a hands-free device?Correct
Incorrect
Bluetooth provides a way to connect wireless devices, such as headsets, to a nearby mobile device. Wi-Fi and 4G provide WAN access to voice and data. Yosemite is the code name applied to a recent version of Apple OS X.Hint
Bluetooth provides a way to connect wireless devices, such as headsets, to a nearby mobile device. Wi-Fi and 4G provide WAN access to voice and data. Yosemite is the code name applied to a recent version of Apple OS X. -
Question 18 of 27
18. Question
1 pointsA technician is configuring email on a mobile device. The user wants to be able to keep the original email on the server, organize it into folders, and synchronize the folders between the mobile device and the server. Which email protocol should the technician use?Correct
Incorrect
The IMAP protocol allows email data to be synchronized between a client and server. Changes made in one location, such as marking an email as read, are automatically applied to the other location. POP3 is also an email protocol. However, the data is not synchronized between the client and the server. SMTP is used for sending email, and is typically used in conjunction with the POP3 protocol. MIME is an email standard that is used to define attachment types, and allows extra content like pictures and documents to be attached to email messages.Hint
The IMAP protocol allows email data to be synchronized between a client and server. Changes made in one location, such as marking an email as read, are automatically applied to the other location. POP3 is also an email protocol. However, the data is not synchronized between the client and the server. SMTP is used for sending email, and is typically used in conjunction with the POP3 protocol. MIME is an email standard that is used to define attachment types, and allows extra content like pictures and documents to be attached to email messages. -
Question 19 of 27
19. Question
1 pointsWhat is the code name used for the OS X 10.10 operating system?Correct
Incorrect
Many operating systems have a user-friendly code name for reference. The code names for recent releases of OS X are as follows:10.8 is Mountain Lion, 10.9 is Mavericks, and 10.10 is Yosemite.Hint
Many operating systems have a user-friendly code name for reference. The code names for recent releases of OS X are as follows:10.8 is Mountain Lion, 10.9 is Mavericks, and 10.10 is Yosemite. -
Question 20 of 27
20. Question
1 pointsWhat is a purpose of the boot manager program?Correct
Incorrect
Many devices have multiple operating systems installed in different partitions. When a device boots, the boot manager asks the user to select the OS to use. The boot manager then directs the BIOS to the correct partition so that the device can continue to boot by using the selected OS.Hint
Many devices have multiple operating systems installed in different partitions. When a device boots, the boot manager asks the user to select the OS to use. The boot manager then directs the BIOS to the correct partition so that the device can continue to boot by using the selected OS. -
Question 21 of 27
21. Question
1 pointsWhat is the purpose of signature files used to secure mobile devices and operating systems?Correct
Incorrect
Antivirus and antimalware software compare the contents of a disk with sample virus and malware code included in signature files. If a comparison is found, the user can be notified and the virus can be isolated or removed.Hint
Antivirus and antimalware software compare the contents of a disk with sample virus and malware code included in signature files. If a comparison is found, the user can be notified and the virus can be isolated or removed. -
Question 22 of 27
22. Question
2 pointsA file called new_resume has the following file permissions: rw-r-x–x What two facts can be determined from these permissions? (Choose two.)Correct
Incorrect
Read, write, and execute permissions are assigned to each file. The permissions are listed in groups of three. The first group of three permissions references users, the second references group members, and the third references others. The first position of each of the three permissions is the R or read permission, the second is the W or write permission, and the third is the X or execute permission. If any position has a dash, the associated group does not have permission for that category. In this case, the user hasread and write access (rw-). Group members haveread and execute access (r-x). Other people haveexecute only access (–x).Hint
Read, write, and execute permissions are assigned to each file. The permissions are listed in groups of three. The first group of three permissions references users, the second references group members, and the third references others. The first position of each of the three permissions is the R or read permission, the second is the W or write permission, and the third is the X or execute permission. If any position has a dash, the associated group does not have permission for that category. In this case, the user hasread and write access (rw-). Group members haveread and execute access (r-x). Other people haveexecute only access (–x). -
Question 23 of 27
23. Question
1 pointsWhat is the result of doing a factory reset on a mobile device?Correct
Incorrect
After a factor reset, a mobile device is left in the same state that it was when it left the factory. The operating system software would not be altered but all user data, settings, and third party applications would be deleted. Backups should be done prior to a factory reset. Updates or patches to the operating system could be done before or after the factory reset.Hint
After a factor reset, a mobile device is left in the same state that it was when it left the factory. The operating system software would not be altered but all user data, settings, and third party applications would be deleted. Backups should be done prior to a factory reset. Updates or patches to the operating system could be done before or after the factory reset. -
Question 24 of 27
24. Question
1 pointsWhat tool can be used on a mobile device to display available cellular networks, location of networks, and signal strength?Correct
Incorrect
A cell tower analyzer can be used on cellular networks to display available cellular networks, location of networks, and signal strength. A WiFi analyzer can be used to display information about WLAN networks.Hint
A cell tower analyzer can be used on cellular networks to display available cellular networks, location of networks, and signal strength. A WiFi analyzer can be used to display information about WLAN networks. -
Question 25 of 27
25. Question
1 pointsAn administrator is re-imaging a large number of Mac OS X machines. What built-in tool or command can be used to remotely boot the computers?Correct
Incorrect
Netboot is a built-in tool on the Mac OS that allows for remotely booting the computers. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system. MSTSC is used to open the Windows Remote Desktop utility. Time Machine is an automatic backup utility built into the Mac OS.Hint
Netboot is a built-in tool on the Mac OS that allows for remotely booting the computers. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system. MSTSC is used to open the Windows Remote Desktop utility. Time Machine is an automatic backup utility built into the Mac OS. -
Question 26 of 27
26. Question
1 pointsWhat tool or command is used in the Mac OS X to navigate the file system?Correct
Incorrect
Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system. The mstsc command is used to open the Windows Remote Desktop utility. The Task Manager tool on Windows allows a user to view all running applications.Hint
Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system. The mstsc command is used to open the Windows Remote Desktop utility. The Task Manager tool on Windows allows a user to view all running applications. -
Question 27 of 27
27. Question
1 pointsWhat command is used to open a text editor in Unix-like systems?Correct
Incorrect
The vi command is used to open the text editor; ls displays files within a directory; grep searches for strings of characters within a file; and ifconfig displays information about the network interface card.Hint
The vi command is used to open the text editor; ls displays files within a directory; grep searches for strings of characters within a file; and ifconfig displays information about the network interface card.