We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJaylynn Witcraft
Modified about 1 year ago
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User
2 2 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 5.5Identify software for various mobile devices 5.6 Explain the general differences between office-based and mobile work models 5.7 Summarize how users of mobile computing devices can protect themselves and their devices while using them courteously
3 3 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Software Software:Software: –For notebooks, tablets, and netbooks –To support mobile devices –To assist with mobile computing –For general use (apps)
4 4 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Notebooks, Tablets and Netbooks Software is limited only by what the hardware and OS are capable of runningSoftware is limited only by what the hardware and OS are capable of running Power plan:Power plan: –When you begin using the computer, check power type, battery level, and power plan –Hover the mouse over the battery icon –Hover the mouse over the wireless icon to display the quality of the wireless connection
5 5 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Devices Ring tones: Sounds that signal an incoming call or text messageRing tones: Sounds that signal an incoming call or text message –Can be chosen by the user –Most phones include an assortment –Other ring tones available Wallpaper: Customized background appearance of the screenWallpaper: Customized background appearance of the screen –Varied options –Can be created on a PC and transferred to the phone –Free wallpaper available online may introduce malware
6 6 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Computing Anti-malware is needed for a smart phoneAnti-malware is needed for a smart phone Synchronizing programs transfer information between devicesSynchronizing programs transfer information between devices Wi-Fi scanning software makes it easy to connect to open Wi-Fi networksWi-Fi scanning software makes it easy to connect to open Wi-Fi networks Apps for QR codesApps for QR codes (two-dimensional bar codes that encode Web addresses that encode Web addresses and other information)
7 7 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. General Use Many programs are available for smart phones and PDAsMany programs are available for smart phones and PDAs Programs vary by devicePrograms vary by device Some apps make the online experience better with Web browsing, social networking, etc.Some apps make the online experience better with Web browsing, social networking, etc. Some apps support particular interestsSome apps support particular interests Some apps offer business and productivity softwareSome apps offer business and productivity software
8 8 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Choosing Software to Download Apps are generally organize by keyword or categoryApps are generally organize by keyword or category Ways to improve the chance of finding useful software:Ways to improve the chance of finding useful software: –Visit the application store –If the store has knowledgeable salespeople, ask them –Ask a knowledgeable friend –Visit a trusted download site for PC programs
9 9 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Effective Mobile Business FlexibilityFlexibility Mobile considerationsMobile considerations Specific tips for businessesSpecific tips for businesses Considerations for mobile workersConsiderations for mobile workers When and where to workWhen and where to work
10 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Flexibility Flexibility is one key benefitFlexibility is one key benefit –Virtual teams: Teams whose members are geographically dispersed and use technology to communicate –Telecommuting: The practice of having employees work remotely
11 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Considerations Management styleManagement style – Managers must be able to supervise from a distance Performance measurementPerformance measurement –Performance must be measurable from a distance CostsCosts –Virtual office: company sets up minimal office services Information risk:Information risk: –Potential of risk to the company’s intellectual property
12 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Specific Tips for Businesses Manage by goal, not by typing timeManage by goal, not by typing time Make some of the work goals very short termMake some of the work goals very short term Establish workers availabilityEstablish workers availability Give supervisors guidelinesGive supervisors guidelines
13 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Workers Considerations for mobile workersConsiderations for mobile workers –Preferred environment –Active communication –Consistent focus –Appropriate tasks When and where to work:When and where to work: –Finding a quiet place –Setting a schedule –Prioritizing work
14 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Safe Computing Driving safelyDriving safely –A prevalent risk in mobile computing is the danger of using cell phones while driving Protecting equipment from theft, loss, and damageProtecting equipment from theft, loss, and damage –Keep your cell phone in a safe place Protecting privacyProtecting privacy Installing malware protectionInstalling malware protection
15 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Safe Computing Accessing public Wi-Fi spots safelyAccessing public Wi-Fi spots safely –Be cautious about joining open wireless networks Virtual private network (VPN): a private, secure connectionVirtual private network (VPN): a private, secure connection –A VPN uses tunneling, a method in which each piece of data (each packet) from the sending computer is encapsulated within another packet before being sent –Individuals can subscribe to a personal VPN for a fee
16 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Courteous Computing Pay attention to one thing at a timePay attention to one thing at a time –Excuse yourself to take a call Keep private conversations privateKeep private conversations private Turn down or mute the sound on your deviceTurn down or mute the sound on your device Say good-bye when chatting or sending instant messagesSay good-bye when chatting or sending instant messages Write when you’re calmWrite when you’re calm
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Sophos Mobile Security Free Version, June ‘Anti-virus’ protection for Android Free version Scans apps for malicious code Locks and locates your.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART II.
Speaker Name, Title Windows 8 Pro: For Small Business.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
FriendFinder Location-aware social networking on mobile phones.
Making Contact With Your Customers. Who are Klick2Contact? Highly experienced telecommunications professionals Backed by major European investment group.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
For further information computersecurity.wlu.ca
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
By Tilly Gerlack. THREATS Data theft is a problem where people are stealing information. Office workers have a better chance of committing a theft of.
Move Pictures From Your Mobile Phone to Your PC. You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Lesson 13: Customizing System Settings what the Control Panel is changing or customizing the desktop display changing the date or time changing or customizing.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
REAL TOOLS FOR REAL AGENTS *Patents Pending
Digital Citizenship By Web Design. It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
OfficeTrack Mobile Employees Location Management Solution.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Digital Technology Basics Digital Technology Basics includes two lessons: Lesson 1: The Modern Digital Experience Lesson 2: Digital Technology & Career.
Remote Desktop Connection Techniques Wireless Communication Networks.
Get2Modern A plan for Windows XP & Office 2003 EOS migration in SMB Microsoft Confidential. NDA required.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Chapter 8 Browsing and Searching the Web. Browsing and Searching the Web FAQs: – What’s a Web page? – What’s a URL? – How does a browser work? – How do.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
IT Introduction to Information Technology CHAPTER 01.
What Is Avast? Avast is an antivirus program that is often used as a free alternative to other paid antivirus software such as Norton and McAfee. Avast.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials Software: Finding and installing software Suitable for: Improver.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Making your PDA work for you! Sharaine Rawlinson Cindy Camp.
OCR GCSE ICT B063 (2016) ‘PROGRESS LEISURE’ © ZigZag Education 2015 Photocopiable/digital resources may only be copied by the purchasing institution on.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
By Janea Tate Skype is a software application that allows users to make voice calls over the Internet. Calls to other users within the Skype service.
Protecting Yourself Online (Information Assurance)
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
© 2017 SlidePlayer.com Inc. All rights reserved.