Sign in

Sign in to confirm

Have you forgotten your password?

... or login with Facebook:

Don't have an AndroidPIT account yet? Sign up

TROY

  • Description

    The TROY app helps you stay connected with Troy University from wherever you are! Use the TROY app to find a faculty or staff member in the directory and get in touch instantly, stay in-the-loop with the latest campus news, watch videos from ...Read more

App Questions

Do you have a question about this app?

Related Apps

Top Apps

App Details

  • UPDATED ON:
  • GRÖSSE: 14,680,064
  • INSTALLATIONS: 10,000 - 50,000
  • LATEST VERSION: 2.1
  • ERFORDERLICHE ANDROID-VERSION: 2.2 and up
  • Permissions
  • NETWORK COMMUNICATION
    • full Internet access
      Allows an application to create network sockets.
    • view network state
      Allows an application to view the state of all networks.
  • YOUR LOCATION
    • coarse (network-based) location
      Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
    • fine (GPS) location
      Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
  • PHONE CALLS
    • read phone state and identity
      Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
  • STORAGE
    • modify/delete SD card contents
      Allows an application to write to the SD card.
  • YOUR PERSONAL INFORMATION
    • write contact data
      Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
    • read contact data
      Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
    • read calendar data
      Allows an application to read all of the calendar events stored on your phone. Malicious applications can use this to send your calendar events to other people.
    • write calendar data
      Allows an application to modify the calendar events stored on your phone. Malicious applications can use this to erase or modify your calendar data.
  • YOUR ACCOUNTS
    • discover known accounts
      Allows an application to get the list of accounts known by the phone.
    • act as an account authenticator
      Allows an application to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.
    • manage the accounts list
      Allows an application to perform operations like adding, and removing accounts and deleting their password.
  • OTHER
    • com.android.launcher.permission.INSTALL_SHORTCUT
    • com.android.launcher.permission.UNINSTALL_SHORTCUT
    • com.blackboard.android.central.troy.permission.MAPS_RECEIVE
    • com.google.android.providers.gsf.permission.READ_GSERVICES
    • com.google.android.c2dm.permission.RECEIVE
    • com.blackboard.android.learn.permission.C2D_MESSAGE
    • android.permission.READ_EXTERNAL_STORAGE
    • android.permission.READ_CALL_LOG
    • android.permission.WRITE_CALL_LOG