Which one of the following permissions is used by applications that access the CallLog?

a. CALL_LOG

b. ACCESS_PHONE

c. ACCESS_CALLLOG

d. READ_CONTACTS

d. READ_CONTACTS
Applications that access the CallLog use the READ_CONTACTS permission.

Computer Science & Information Technology

You might also like to view...

Match the following types of storage devices with their use:

I. Internal hard disks II. Flash memory cards III. USB drives IV. Optical disks V. Internet hard drive or cloud A. Storing data through a website service that is accessible from any computer. B. Popular and portable devices that can store up to 64 GB of data. C. Used in cameras, smartphones, and GPS navigation systems. D. Main storage for your computer that cannot be removed. E. CD, DVD, or Blue-ray.

Computer Science & Information Technology

The expression static_cast(9.9) evaluates to ____.

A. 9 B. 10 C. 9.9 D. 9.0

Computer Science & Information Technology