Google Android Enterprise associate certification answers

This file contains all possible real exam questions with 100% correct and verified answers. Free updates included. Save your time.





Below you’ll find some selected questions from the latest real certification exam. You can get an idea about the exam format and prepare for it smarter. Need all exam questions with answers? Consider downloading our file.

Device management is widely used by organizations around the world. Which of the following is not an Enterprise Mobility use case that you probably often see in your daily life?

  • Using an E-Menu tablet in a restaurant to place an order faster directly to the kitchen without calling the waiter.
  • An employee using a managed Android device owned by the company that has been customized into a barcode scanner to perform a job faster anywhere.
  • An employee uses his mobile device to send a message to his colleague to invite him to a friendly afterwork.
  • None of above - they are all Enterprise mobility use-cases.

Bank Corp has a mixture of use cases in their organization. They have selected Android devices as their default choice for work. What are some of the management modes available to them? Select All Correct Responses

  • Dedicated device
  • Personally Enabled
  • Bring Your Own Device (BYOD)
  • Productivity

You have already selected the appropriate device required to meet your end-user’s requirements. What are the next stages of implementing the appropriate mobility solution for your end user? Select All Correct Responses

  • Selecting device management modes
  • Selecting device enrollment and distribution methods
  • Establishing device update cadence
  • Identifying an application management strategy

What are the stages of implementing a mobility solution?

  • “1. Identify requirements and use case 2. Procurement 3. Device management 4. Application deployment to devices 5. Device enrollment and distribution 6. Operations and maintenance”
  • “1. Identify requirements and use case 2. Procurement 3. Device management 4. Device enrollment and distribution 5. Application deployment to devices 6. Operations and maintenance”
  • “1. Identify requirements and use case 2. Procurement 3. Application deployment to devices 4. Device enrollment and distribution 5. Operations and maintenance 6. Device management”
  • “1. Procurement 2. Identify requirements and use case 3.Application deployment to devices 4. Device enrollment and distribution 5. Device management 6. Operations and maintenance”

Which of the following help to protect Android devices against security vulnerabilities? Select All Correct Responses

  • Encryption
  • Verified Boot
  • Social engineering
  • Regular and controlled updates

When deploying managed devices, there will be a few different organizations involved with a different roles and responsibilities. Which of the following parties is required to provide networks, supplying and distributing devices?

  • Carrier/Device resellers
  • OEM Manufacturers
  • Google
  • Service Providers

Who can add devices to a customer’s zero-touch account?

  • The customer IT Admin
  • The EMM provider
  • The device manufacturer only
  • The device reseller and/or their vendors (if enabled)

How often does Google issue Android security patches?

  • Every 30 days
  • Every 90 days
  • Every 7 days
  • Once a year

You are talking to Bina, the CIO of Sales LTD. They are concerned that apps on Android share data by default. You realize they could benefit from understanding Application Sandboxing a little better. How would explain this concept to Bina?

  • Application Sandboxing encloses apps and data in their own virtual sandcastles, meaning that data can only be accessed by entering the end users passcode. It also protects against harmful users by crumbling the sandbox in the event a new user is discovered.
  • Application Sandboxing ensures apps and data are able to share from others (like at a playground sandbox), meaning that data can be accessed by apps that do not have the authority. It also helps harmful app accessing any data from the OS or any other apps by throwing sand in the bad apps containers.
  • Application Sandboxing is a technology that allows each app to create its own virtual sandbox and limit the end user from being able to copy and paste data from the app into another app.
  • Application Sandboxing ensures apps and data are isolated from others, meaning that data cannot be accessed by apps that do not have the authority. It also protects against a harmful app accessing any data from the OS or any other apps.

Using an Android Enterprise EMM solution, IT admins can set up and apply over the air (OTA) system updates to devices under management. They also have the ability to decide when these updates are pushed out to the devices OTA in order to test them prior to being released. What are the options for IT admins to push out these updates? Select All Correct Responses

  • Automatic Install: Device receives OTA update immediately
  • Windowed: IT admin schedule OTA updates
  • Postponed: IT admin delay OTA update for 30 days
  • Blocked: OTA updates are permanently blocked


Passing exams is not a workout. Multiple attempts won’t make you stronger.

Save your time with our answer-sheets. Get certified in minutes.



Android Enterprise creates “defense in depth” by using four layers of protection. Identify the two of these layers from the given list. Select All Correct Responses

  • Hardware: Android devices have tamper-resistant hardware to ensure the OS hasn’t been compromised. Dedicated components handle critical tasks like encryption or screen lock.
  • Emojis: Android supports Emojis which are pictograms, smileys and other graphics used in electronic messages and web pages. The emoji’s primary function is to fill the end user with positive emotions to position them in happier and more secure place while using their device.
  • Dynamic Wallpaper: Android Devices support animated background images that can be used as the devices wall paper that will confuse a would be hacker and discorage them from attempting to exploit the device.
  • Google Play Protect: provides 24/7 mobile security that scans apps and devices. Using machine learning, it detects and blocks malware, constantly learning so it’s always up to date to protect users from the latest threats.

Which Android Enterprise device enrollment method requires little to no interaction with an end user’s device from IT?

  • DPC
  • Zero-touch
  • QR Code
  • NFC
  • This program helps Enterprise users to choose device model, EMM solutions and/or Service Providers that meet a higher enterprise requirement and are recommended by Google.
  • Because OEM’s and services pay to be part of the service, you can be confident that these services meet the high bar.
  • Only devices and services on the list work with Android Enterprise.
  • All Android Enterprise Recommended devices come with pre-installed enterprise applications by Google.

Lulu, the head of procurement for Bank Ltd, wants to purchase premium devices for their executives. They want to allow personal use on these devices, respecting the privacy of users but also being able to maintain control. What management mode would you suggest to Lulu?

  • BYOD - Lulu can simply ask all executives to setup their devices as personal devices, first with their Google accounts and then enroll them into management using a work profile.
  • Fully Managed - Lulu should not allow personal use on company owned devices and that is also not recommended.
  • COPE - Lulu can deploy devices using COPE (corporate owned, personally enabled). With this, the user can get all the privacy protections of the work profile and IT can maintain control but not at the cost of user privacy.
  • COPE - Lulu can deploy a work profile for each device and give the IT special access into the personal side also. Users should be warned that all data on their personal side is visible to IT at any time.

Which of the following is NOT a part of the zero-touch enrollment process?

  • Company admin creates enterprise mobility management configurations that will apply to devices in the zero-touch portal.
  • The reseller creates a customer account within the zero-touch portal, or via API, uploads the IMEI(s) of the device(s), then ships the devices to the company.
  • Customer admin adds the IMEI(s) of the existing devices and BYOD devices into the Zero-touch portal.
  • Company orders compatible devices from a zero-touch approved reseller.

When can a customer get access to the zero-touch portal?

  • The customer signs up and creates it.
  • The device manufacturer creates one for the customer.
  • The EMM provider enrols their devices.
  • The reseller creates an account for the customer.

One of the use cases that Android Enterprise offers is to allow the use of both personal and work in one device using work profile. What is the benefit of work profile?

  • A work profile is only helpful seperating network traffic.
  • A work profile can be set up on an Android device to separate work and personal apps/data, including the clipboard, and data sharing. With a work profile you can securely and privately use the same device for work and personal purposes.
  • A work profile comes with a new mobile number offered by Google.
  • Work profile applications delete after every user session and install the next time automatically.

Jana from Sales Ltd is worried about custom operating systems or malicious code being installed on her fleet of managed devices. You remember the concept of verified boot from your Android Enterprise training. How would you explain Verified Boot to Jana?

  • Verified Boot asks the user every single time what good version of the operating system they would like to boot up in.
  • Verified Boot confirms all executed code has passed the code review by the companies IT department and they have authorized the device to access corporate IT resources such as email and apps.
  • Verified Boot ensures all executed code comes from a trusted source (usually device manufacturers), and has not been modified by an attacker or corrupted. By verifying the OS it ensures a device will be running a safe version of Android.
  • Verified Boot ensures the device will boot up within 30 seconds to prevent end users from becoming inpatient and attempting to root their devices.

Steve, from Scuba School, wants to buy 10,000 new Android smartphones, send to his online students around the world and have them set up the devices automatically by just turning the devices on and connecting to a wifi network or cellular network. What does Steve need to make this happen? Select All Correct Responses

  • Purchase 10,000 brand new Android smartphones running Android version 9.0+ that have Google Mobile Services from a validated zero-touch reseller.
  • Create a Google account to use with the customer zero-touch portal and send that to the zero-touch reseller to create the account.
  • Set up an EMM solution to push apps and policies when enrolling into the EMM solution company devices.
  • Create an EMM configuration in the customer zero-touch portal to connect the customer zero-touch devices with the customer EMM solution during the initial device set up.

Zen, an existing zero-touch customer, wants to purchase devices from a new reseller. What is the process he needs to follow to have his new devices enrolled in zero-touch from the new reseller?

  • Deregister all existing devices.
  • Request a new zero touch account.
  • Provide his customer ID and enable the new reseller in his Reseller list.
  • Email Android Enterprise support team to open the request.

What are the “DPC extras” configurations used for?

  • Deregistering devices
  • Securing the devices with EMM
  • Configuring additional provisioning settings
  • Defining the device policies

Bank Corp is looking to deploy 3000 Android devices using zero-touch. What are some of the benefits of this type of deployment?

  • Simplicity and flexibility for IT
  • Easy productivity for users
  • All of these
  • Enforced management and security for organizations
  • Only Google Pixel devices
  • Premium Devices, Budget Devices, Rugged Devices and Purpose Built Devices
  • Only Premium devices
  • Only devices that have screens larger than 5.5 inches

What are the common security threats to implementing a mobility solution in business? Select All Correct Responses

  • Malware and phishing
  • Network attacks
  • Social engineering
  • Application sideloading

Mika, a new marketing intern, has enrolled her personally owned device into her employer’s EMM solution, known as the BYOD (Bring Your Own Device) use case. What can Mika’s IT manager do on her device in this case?

  • Provide Mika with fully compliant access to company IT resources and apps completely separated by the work profile with no access to her personal profile and data.
  • Fully erase the device at any time completely wiping the device of all data without the ability to only erase company data.
  • Use the device processors to mine crypto currency when their device is charging at night while they sleep to earn bonuses.
  • Read personal text messages, view personal photos and capture all data on the device regardless it being personal or work data.

How can a business ensure that mobile workers can safely reach internal company websites?

  • End users should use a VPN that will create a secure connection wherever the user is.
  • Prevent users from connecting to public Wifi.
  • Public Wi-Fi is fine, if the browser uses Incognito or Private mode.
  • Android has a firewall built in, reducing the risk of network sniffing.

Which of the following provides 24/7 mobile security that scans apps and devices, detecting and blocking malware to protect users from the latest threats?

  • Safe Browsing
  • Google Play Protect
  • Device Admin API
  • SafetyNet

The App Defense Alliance was created to ensure the safety of Google Play. What appropriate action can be taken to protect users?

  • New app risk intelligence can be generated as apps are being queued to publish and partners will analyze that dataset before the availablity of an app on Google Play to protect users.
  • Partners of the App Defense Alliance can send a request to the Google Play Protect scanner service to have an app analyzed.
  • Scan results can be sent back to the partner and Google Play Protect receives analysis from the partner’s scanning engines to protect the users.
  • All of these

What criteria can be used to search for devices on the zero-touch portal?

  • Device IMEI only
  • Device Serial only
  • Device IMEI, MEID, Serial and Customer ID or Name
  • Device name and Memory size

Which of the following devices are compatible with zero-touch?

  • Only GMS models for specific brands
  • Any Android Device with OS version 7 or newer
  • Selected GMS devices running Android 8.0 and all GMS devices running Android 9.0 and above
  • Any Android Device

What would be a good feature to discuss when talking to a customer about using a personal device for work?

  • Ability for IT to track devices.
  • Ability for IT to block all non-work-related calls.
  • Work profile and all its privacy protections for users.
  • IT visibility into the whole device.

When deploying wifi only devices with zero-touch, what information is needed from the devices?

  • Manufacturer, Model, Serial Number
  • IMEI, Screen size, Serial Number
  • Manufacturer, Serial Number, MAC Address
  • Model, Manufacturer, IMEI

Who can remove devices from the zero-touch portal?

  • Both customer and reseller
  • Only the customer
  • The end users
  • Only the reseller

Mobile threat protection services are built into every Android device. Which of the following Google Services keeps us safe while browsing websites?

  • Rollback Protection
  • Google Play Protect
  • Safe Browsing
  • SafetyNet

Greg works at Company Sales Ltd and has asked you to enrol all their devices into zero-touch to ensure they cannot be used if they were lost or stolen. You realized that Company Sales Ltd does not have an EMM. What should you recommend to Greg?

  • Nothing to worry about. Greg does not need an EMM solution for zero-touch.
  • An EMM solution is a requirement for zero-touch.

Which of the following is required for zero-touch enrollment to work on a registered device?

  • Vendor account
  • Zero-touch admin account
  • Managed Google Play Account
  • Zero-touch configuration

Which of the following defines zero-touch?

  • Zero-touch is an enrollment method used for compatible Android devices.
  • It is a custom enterprise solution.
  • It is an alternative App distribution platform to Google Play.
  • It is a device management solution.

Which of the following is required from customers for the reseller to be able to create a zero-touch account for them?

  • A customer ID
  • The list of device IMEIs
  • A Gmail address
  • A Google account

Which of the following is NOT a benefit of zero-touch enrollment?

  • Instant and easy EMM enrollment of personally owned devices, commonly referred to as BYOD devices
  • Effortless, automated EMM enrollment and device provisioning at any scale
  • Easy set up for end users
  • Factory Reset protection - zero-touch devices are “locked” to company even if reset

Liz, a customer, wants to turn on her zero-touch device for the first time. What does she need to do?

  • Go through the standard Android device set up, then add their company email account to begin the zero-touch enrollent process.
  • Literally nothing. Liz just needs to turn it on and not touch it.
  • Simply power on the device, connect to a wifi or cellular data network and touch through the set up screens to automatically enroll the device on the company’s EMM solution and receive all the required configurations, apps and security policies.
  • Plug it in and let it charge for 24 hours prior to doing anything else and do not touch it.

Which of the following statements is true?

  • A company should enroll its employees personal devices
  • All of these
  • A company can only enroll corporate owned devices.
  • A company cannot ask it’s employees to add their personal devices to zero-touch.

A customer will be provided with a different zero-touch account from each one of their resellers.

  • True
  • False

As a zero-touch reseller, how can you deregister a device? Select All Correct Responses

  • Factory wipe the device.
  • Use the device upload CSV and specify 0 in the owner column.
  • Search for the device and select deregister.
  • Use the device upload CSV and specify -1 in the owner column.

A reseller, from the Zero-Touch portal, how many end customer accounts can you create and / or supply devices?

  • The reseller can only create and supply devices to only 1 end customer, to provide the service for another customer the reseller must create a new account.
  • The reseller can only create and provision devices to 256 end customers, to provide the service for another customers the reseller must create a new account.
  • The reseller can create and supply devices to as many customers as they want.
  • This configuration is not available from the reseller portal.

As a zero-touch customer, how many resellers can be registered in the list of authorized resellers?

  • A customer can only have 32 authorized sellers.
  • A customer can have as many resellers as they want.
  • A customer does not have access to perform this configuration from their portal.
  • A customer can only have one authorized reseller to register a new one and delete the existing one.

In order to deploy devices with zero-touch, it’s necessary to purchase the hardware from a — and have a zero touch compatible —

  • Regional Carrier. EMM
  • Local hardware vendor. Deployment platform.
  • Validated Reseller. Deployment platform.
  • Validated Reseller. EMM.

Which of the following use cases does zero-touch support?

  • Dedicated devices
  • Work only devices
  • All of these
  • Work profile on company owned devices

Who can manage the zero-touch portal roles?

  • Zero-touch account’s owner
  • Zero-touch account’s Admin

We’ve explored the mobility journey and looked at how Android fits in business. Let’s check what you’ve learned so far. How is Android the perfect fit for the airline? Select the two correct answers, and submit.

  • Android allows unknown source side-loaded methods which are the best practice to deploy sensitive corporate private applications.
  • Android can easily be rooted to make it easier for the IT department to modify for their corporate needs.
  • Android comes with flexible management options to suit different teams.
  • It has layers of security and a wide variety of devices to choose from to suit any budget.

What would be the appropriate response when a customer says: “We don’t have the budget to provide the marketing team with smartphones although we would like them to be able to access their work email on their own device. We need to be able to ensure the information on the device is secure and company information can be wiped if the phones are lost or stolen.” Select the correct answer, then submit.

  • Google Play Protect
  • BYOD
  • Array of devices
  • Zero-touch

The IT admin wants to start rolling out Android devices at the airline but is confused by all the different options. What program would help them learn more about enterprise devices and solutions? Select the correct answer, then submit.

  • Android Enterprise Recommended
  • Personal profile
  • BYOD
  • Google Play Protect

What would be the most appropriate response when a customer says: “We have employees out on the runway, working from home, as well as in our engineering depots and offices. How can we cater for them all?” Select the correct answer, then submit.

  • Array of different devices, with varying features and price points.
  • Seamless fleet management.
  • Google productivity and third party apps from managed Google Play.
  • All of these.

The airline is worried about security. What benefits does Android Enterprise provide to customers to ensure devices are secure? Select the two correct answers, then submit.

  • Google Play Protect scans devices and apps daily to block malware and other threats.
  • Android Enterprise Recommended devices have regular security updates.
  • Managed devices keep the cameras on so IT can find any lost devices.
  • Some devices automatically force shutdown when an attempt to share data is detected.

Mika a new marketing intern has enrolled her personally owned device into her employer’s EMM solution, known as the BYOD (Bring Your Own Device) use case. What can Mika’s IT manager do on her device in this case?

  • Provide Mika with fully compliant access to company IT resources and apps completely separated by the work profile with no access to her personal profile and data.
  • Read personal text messages, view personal photos and capture all data on the device regardless it being personal or work data.
  • Use the device processors to mine crypto currency when their device is charging at night while they sleep to earn bonuses.
  • Fully erase the device at any time completely wiping the device of all data without the ability to only erase company data.

Select each box and choose the correct option, then submit.

  • Android powers more than - billion devices globally.
  • Select… “3”
  • Zero-touch enrollment allows IT to - corporate-owned devices in bulk, without having to set each one up manually.
  • Select… “deploy”

Select your partner type below. So you can see relevant content to your role, choose your role, then submit.

  • EMM Provider – Sales
  • EMM Provider – Technical user
  • Device Manufacturer – Sales
  • Device Manufacturer – Technical user
  • Zero-touch Reseller – Sales
  • Zero-touch Reseller – Technical user

Why use APIs? Select the correct answer, then submit.

  • You shouldn’t use APIs as they decrease productivity.
  • APIs make your job easier by replacing EMMs.
  • APIs make enrollment a lot more simple, but are more likely to have mistakes due to manual data entry.
  • APIs increase productivity. The zero-touch enrollment API helps zero-touch resellers automate their integration.

How often does Google release security updates? Select the correct answer, then submit.

  • Every 30 days.
  • Every quarter with a software update.
  • Every year, along with a new version of Android.
  • When an exploit is found.

A customer is worried about apps being side-loaded by tech-savvy workers. What would be an appropriate response? Select the correct answer, then submit.

  • A strong password and a strong HR department can prevent side-loading.
  • Android Enterprise management API can prevent users from side-loading apps.
  • Internal apps have to be installed using a side-loading method.
  • Side-loading apps should not cause any security concerns.

What would be a good feature to discuss when talking to a customer about using a personal device for work? Select the correct answer, then submit.

  • Ability for IT to block all non-work-related calls.
  • IT visibility into the whole device.
  • Work profile and all its privacy protections for users.
  • Ability for IT to track devices.

How can a business ensure that mobile workers can safely reach internal company websites? Select the correct answer, then submit.

  • Prevent users from connecting to public Wi-Fi.
  • End users should use a VPN that will create a secure connection wherever the user is.
  • Android has a firewall built in, reducing the risk of network sniffing.
  • Public Wi-Fi is fine, if the browser uses Incognito or Private mode.

From your initial conversation with Alex, you noted that she’s looking for a new way for staff to book vacation time and review schedules outside of the office.

  • What can you ask to find out more information? Select the correct answer.
  • “How many departments are stakeholders in this project?”
  • “Would an automated deployment mode be something that would be useful to you?”
  • “Do you have any specific hardware requirements?”

What conclusion should you draw?

  • “A BYOD solution with a work profile is probably appropriate here.”
  • “She needs to tightly control what apps are installed on those personal devices to secure them.”
  • “Customers buying their own devices with discounts is a risk for the company.”
  • “She needs to consider getting a budget for rugged devices for flight crews.”

It’s really important to understand what devices need to be supported. Alex says: “The store offers a wide selection of Android devices, often purchased by the employees.” What question should you ask next?

  • “Excellent! How is scheduling done at the moment? Do you use custom software?”
  • “Do you need to speak to an app developer?”
  • “How do the flight crews communicate with each other?”
  • “Everyone could be issued with a managed Google Account and use Google Calendar. How does that sound?”

We need to know what software requirements Alex has, so we can determine if they are developing an internal app or using a ready-made solution. Alex fills you in: “We use Microsoft Teams to organize calendars by team and we want to keep this, as payroll uses the schedules for monthly wages.” What question should you ask next?

  • “Looks like a dedicated device would suit you. Would you like me to take you through the details?”
  • “Are you at the very beginning of this project, or have you already given it some thought?”
  • “Are there any concerns that affect how you want this solution deployed?”
  • “How does transferring configurations to new devices with a pre-programmed NFC tag sound to you?”

Alex has some concerns. Let’s see what they are: “Well, we’re concerned about keeping scheduling information private as our competitors try to capture as much data about us as they can. We’re also aware that staff may not adopt the new system if they feel the company is managing their personal devices. While this project has been approved, it’ll be pulled if we can’t ensure privacy.” How should you respond?

  • “Those are valid concerns. Would it be helpful if I explained how data is separated with a work profile and find some documentation to inform your stakeholders?”
  • “I’m afraid we can’t help you with those security concerns.”
  • “That’s ok. Everything is encrypted on an Android device from the OS, the apps and the data. There is no chance of your data getting into the wrong hands.”

From your initial conversation with Lindsay, you note that they are looking for a means to search stock inventory and check items in and out. Accurate recording of serial numbers is needed as a character difference can mean the wrong part is allocated to a repair. What question can you ask to find out more to build a potential solution? Select the correct answer.

  • “Will you need access to Google Play?”
  • “Do you have any requirements regarding the devices you want to use?”
  • “Have you considered how you will keep the devices up to date?”

Great place to start! Lindsay says: “Some of our mechanics use feature phones and don’t have much experience with smartphones. I think I might need something tough — they aren’t the most gentle and we are outside a lot!’’ What question should you ask next?

  • “Do your engineers have any concerns about data and privacy?”
  • “Considering your mechanics don’t have much experience with smartphones, how about a kiosk in the office?”
  • “How about training your staff on how to use smartphones before deciding how to manage these devices?”
  • “Do you have any needs when it comes to managing these devices?”

Yes, it’s good to know whether the customer has any requirements in regards to the management of the devices. Lindsay replies saying: “I think we’d like to set everyone up with some apps so we can communicate with them when they’re out in the field. It would also be useful to track the devices in case they get lost.” What question should you ask next?

  • “Does the company use Google Workspace?”
  • “Have you thought about how the devices might be set up?”
  • “Do you need a VPN to access your network over 5G?”

From your initial conversation with Amira, you’ve gathered that she wants to install a number of information points around the airport. What question can you ask to find out more to build a potential solution? Select the correct answer.

  • “How big is your distribution department?”
  • “How would using personal devices suit your team?”
  • “In terms of hardware, do you have any specific goals or requirements?”

A good place to start! Amira says: “We’ve looked at some kiosk enclosures that have interactive displays which would be ideal. We are looking at six to begin with, where we can see pinch points in people traffic around the building.” What question should you ask next?

  • “What would run on these interactive screens?”
  • “Sounds like you need company-owned devices with personal use allowed. Shall I take you through the next steps for this solution?”
  • “Does your building have access to 5G?”

That’s right, it would be useful to find out more about the software needed. Amira replies, explaining that the screens would show a number of things: A map of the airport terminal with hot spots that can be tapped on for more detail, such as the gates, for example. Commonly needed directions for the restrooms, cafes, lost luggage and check-in areas. In times of emergency, the screens would direct customers to meeting points. Each one would have a “Call for help” button for anyone in distress or feeling ill. Each kiosk would be unique so that our staff could identify which call for help was pressed and receive an alert on their tablets. Maybe a game for the kids at quiet times. What question should you ask next?

  • “What about transferring configurations to new devices with a pre-programmed NFC tag?”
  • “Are you sure you need kiosks to streamline the experience? Tablets might be cheaper.”
  • “How often would the screen contents change? Have you thought about the app that you would want to run to deliver this content to the devices?”

Good flag, Amira replies: “We haven’t worked that out yet, but maybe we could start with just some kind of screen sharing from a computer? We definitely need to limit access to who could edit content there.” What question should you ask next?

  • “I’m afraid we’ll only be able to help you with the app. Maybe we could create an app for the public with some of those features?”
  • “Ok, sounds like a fixed device managed as a single-use device might do the job. Have you considered what network security may need to be in place?”
  • “How about portable kiosks that customers can pick up and take around the terminal with them?”