1/49
Flashcards based on lecture notes about using shared storage and mobile devices.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The Network and Sharing Center ___.
Allows you to check the network type.
To change the network type, switch to ___.
Settings > Change connection properties
In Advanced sharing settings, ___.
Check that network discovery and file and printer sharing are enabled.
In the "Network access" dialog, select ___ from the list box then click Add.
Everyone
Leave the permission level set to ___ and click the Share button.
Read
Right-click the C:\Holidays folder and select Share with >___.
Stop sharing.
One objective of Unit 5 is to ___.
Identify the key features of different types of mobile devices and mobile operating systems.
Another objective of Unit 5 is to ___.
Configure network, email, and data transfer settings on mobile devices.
A ___ allows the user to control the OS directly through the screen.
Touchscreen
Modern mobile devices use ___ touchscreens.
Capacitive
___—usually the equivalent of a main button mouse click.
Tap
___—usually the equivalent of a right-button mouse click.
Tap-and-hold
___—typically used to switch between documents or apps.
Swiping
___—typically used to zoom out and zoom in.
Pinch and stretch
___—move objects around the screen.
Sliding
Mobile devices use ___ to detect when the device is moved and change the screen orientation.
Accelerometers and gyroscopes
___ is another important interface for controlling a mobile device.
Speech recognition
Access to a mobile device should always be protected by a ___.
Screen lock
Another possibility is for the phone to support a ___.
Remote wipe or kill switch
All but the early versions of mobile device OS for smartphones and tablets provide ___.
Full device encryption
In Android, you need to enable encryption via ___.
Settings > Security
With the release of Android Nougat, full device encryption is being deprecated in favor of ___.
File-level encryption
___ are installable programs that extend the functionality of the mobile device.
Apps
Third-party developers can create apps for iOS using ___.
Apple's Software Development Kit (SDK)
Apps are supposed to run in a ___.
Sandbox
There are generally two choices for connecting a smartphone or tablet to the Internet: ___.
Mobile data access or Wi-Fi.
In iOS, cellular network options are configured via ___.
Settings > General > Network
In Android, the options are configured via ___.
Settings > Data usage
A device can be put into ___ to comply with flight restrictions.
Airplane mode
In iOS, open ___ to configure email settings.
Settings > Mail, Contacts, Calendars then click Add Account
In Android, the email configuration is performed via ___.
Settings > Accounts
The incoming mail server will either be an ___ server.
Internet Message Access Protocol (IMAP) or a Post Office Protocol (POP)
The outgoing mail server will be a ___ server.
Simple Mail Transfer Protocol (SMTP)
The other important option is to enable ___.
SSL/TLS
Mobile device ___ refers to copying data back and forth between a PC and phone or tablet.
Synchronizing
iOS can synchronize with a PC via the ___ program.
iTunes
Android phones use ___ for file transfer with a Windows PC.
Picture Transfer Protocol (PTP) or Media Transfer Protocol (MTP)
While devices can often store gigabytes of data, improved Internet bandwidth means that it can be feasible to ___ this data.
Remote backup
What is the purpose of an ___, as fitted in a mobile device?
Accelerometer
What feature allows data to be removed from a device if is lost or stolen? ___
Remote wipe
___ LANs are based on switches and cabled media; ___ networks use IEEE 802.11 standards
Ethernet LANs are based on switches and cabled media; wireless networks use IEEE 802.11 standards.
___ transmission uses routers to forward small packets over any available network path, making the network more resilient to link failures
packet
At the networking layer hosts are identified by an ____.
IP Address
___ provides a means for people to use plain names or labels to access resources. DNS maps these labels to IP addresses.
DNS
Home/small office networks are usually configured with a ___ ___ ___, combining the function of switch, access point, WAN modem, and router.
multifunction network device
___ ___ are a means of validating the identity of a web server or software publisher.
Digital certificates
___ are another essential component of a secure system as they restrict network communications to authorized hosts, applications, and protocols.
Firewalls
___ is often based on a user name/password log on but can also use tokens and biometric data.
Authentication
___ underpins many security mechanisms. Understand the differences between symmetric and asymmetric encryption and cryptographic hashes.
Cryptography
Technical security controls are usually insufficient. ___ ___ is important too and must be shaped by written policies and procedures.
Behavioral security