When using iPads, iPhones, and iPods, using apps that were not downloaded from the official iTunes App Store requires an unauthorized change to the device's software called a(n) ____.

A. extract
B. break-in
C. jailbreak
D. hack


Answer: C

Computer Science & Information Technology

You might also like to view...

The throws clause of a method:

a. specifies the exceptions a method catches. b. specifies the exceptions thrown by the calling method. c. specifies the exceptions a method throws. d. specifies the exceptions a method throws and catches.

Computer Science & Information Technology

Which of the following types of data is NOT stored in RAM?

A) Web browsing session B) Text that is copied to the clipboard C) BIOS settings D) Microsoft Word document you are working on

Computer Science & Information Technology

Describe how peripherals fit into the network design process.

What will be an ideal response?

Computer Science & Information Technology

To enter a number as text, precede it with a(n) _____.

A. quotation mark (") B. colon (:) C. plus (+) D. apostrophe (‘)

Computer Science & Information Technology