Getting the Most Out of Your Phone You are going to listen to an interview with someone discussing apps. Listen and choose the correct answer. 03│02
1 One advantage of apps that Monica 5 The junk mail app .
DOESN’T mention is . A works for both spam e-mail and normal mail A the low cost B requires the user to return unwanted mail to B the ease of installation the sender C the speed of installation C is something that the presenter has used D the ease of organising them without success 2 Monica is going to talk about . D requires a phone which is equipped with a camera A how apps work B how to install apps 6 The film app tells you . C why her parents don’t understand some apps A what you have missed when you need to D apps which her parents use leave the room 3 Which of these is NOT mentioned as a B about sections of the film in which nothing reason why the programme isn’t going to important takes place mention any app names? C about films which are being shown on the BBC A There may be better apps than the one D how long the advert break will be, so you they know. can leave the room B Listeners get more choice if they search by function. 7 Monica’s last idea could be useful if you . C They can’t be seen to be promoting one A forget your PIN number particular app. B can no longer get up and down stairs D The app they mention may not exist in the without help future. C are worried about personal safety 4 Monica and her parents needed the map app D need to know your exact location to . 8 Listeners are now going to ask . A decide when to leave the bus A about apps they have used B decide which bus to catch B for the names of the apps discussed C translate the Russian alphabet C about other apps that they might find useful D find out where they wanted to go D for help with installing apps
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition
Hacking with Kali Linux: A Step by Step Guide to Learn the Basics of Linux Penetration. What A Beginner Needs to Know About Wireless Networks Hacking and Systems Security. Tools Explanation Included
Mastering Linux Security and Hardening - Second Edition: Protect your Linux systems from intruders, malware attacks, and other cyber threats, 2nd Edition