configuring network access
using wireless devices
configure network access
using wireless devices
Bonus
100
  1. What are examples of local storage? *choose three* (page 114)

A. Hard disk drive

B. Solid State Drive  

C. Web Storage 

D. Internal hard disk 

A. Hard disk drive

B. Solid State Drive  

C. Web Storage 

100
  1. How do you determine which operating system your device uses?(page 161)

A. Turn on the device and it will appear on the screen

B. Access the settings on the device.

C.find device product key

B. Access the settings on the device.

100
  1. Can you configure a peer to peer network (page 114)

No, you cannot configure a peer to peer network



100
  1. What is the most simple email protocol :(page 164)

A. POP3

B. IMAP

C.EP

D. SMTP

D. SMTP

100

which is not a chris brown song

A.Fine china 

B.Privacy

C.Poppin

D. Love 

D.Love 

200
  1. What is the use of VoIP and why is it commonly used? (page 111)

VoIP is the transmission of voice commuications over IP networks. This replaces commonly used traditional telephone systems.

200
  1. What is the difference between a  accelerometer and a gyroscope (page 170)

The accelerometer reads and measures the orientation of the device.  the gyroscope changes the orientation of the device by reading the x and y coordinates

200
  1. True or false: A peer to peer network can only connect to a maximum of 12 computers 

False, only 10

200
  1. Which gesture is used to zoom or make an item smaller :(page 169)

A. Pinch

B. Double tap

C.Drag

D.Swipe

A. Pinch

200

Nike makes all the following shoes except 

A.Airmax

B. OG Aztec 

C.Vapor 

B. OG Aztec is rebok 

300
  1. What is virtualization used for? (page 109)

A.To put multiple operating systems on one computer 

B.To duplicate your system

C. To put a single operating system on multiple computers

D. A LAN network which computers communicate wirelessly

C. To put a single operating system on multiple computers

300
  1. Your phone has no wifi or cellular connection what is the first thing you should do?(page 170)

A. check your airplane mode status.

B. factory reset your phone 

C.check for strong battery life

A. check your airplane mode status.

300

What is the difference between HTTP and HTTPS (page 115)

HTTP is not a secure source while HTTPS is hint (S=secure/safe)

300
  1. enables mobile devices to connect to an Exchange Server:(page 163)

A. Near Field Communication

B. Post Office Protocol version 3 

C.Exchange ActiveSync

C.Exchange ActiveSync

300

What is taco cat spelled backwards?

Taco cat

400

Which of the following best describes ethernet? (page 94) 

A. A network of computers that share a large geographical area
B. A LAN  technology used for connecting computers in a small geographical area
C. A technology used to connect devices over a large geographical area
D. A LAN network which computers communicate wirelessly







B. A LAN technology used for connecting computers in a small geographical area

400

Which is not a basic step in bluetooth pairing?(page 162)

A. Enable Bluetooth on the mobile device through system settings.

B.Click "Forget device" on all history bluetooth pairings

C.On your mobile device, find a device for pairing. 

D.Once the device is found, it will ask for a PIN code

B.Click "Forget device" on all history bluetooth pairings

400
  1. What is a benefit of cloud computing infrastructure? (page 109)

A.Hardware failures do not result in data loss because of networked backups.

B. It is a  technology used for connecting computers in a small geographical area 

C. It is a technology used to connect devices over a small geographical area

D.it is well for people looking to have personal copies of secure information

A.Hardware failures do not result in data loss because of networked backups.

400
  1. True or False: discovery mode will transmit their Bluetooth-friendly name, which is usually the manufacturer's name. :(page 162)

True

400

Cardi or Nicki? 

Both 

500
  1. When is WAN to be used? (page 93)

A.To share files among employees in the same office building

B. To share files among employees in different countries

C. Used to share printing 

D. A network used to share data without small areas

B. To share files among employees in different countries

500
  1. often used for in-person transactions or data exchange:(page 163)

A. Near Field Communication

B. metropolitan area network 

C.VoIP

A. Near Field Communication

500
  1. Which network connections have high mobility and low security (page (9)

A. Wired 

B. Wireless 

C. Cellular 

C. Cellular 

500
  1.  A method used to remove any sensitive data from a mobile device and permanently delete it.(page 161)

A. Factory reset

B. Data wiping

C.Factory delete

B. Data wiping

500

if age aint nothing but a number...

jail aint nothing but a place