Computer Maintenance Chapter Ten Mobile Devices Dr. Mohammad AlAhmad.

Slides:



Advertisements
Similar presentations
Mobile Devices. Definitions Smartphones are phone first, enhanced to do things formerly reserved for PCs Tablets embody those enhanced computing features.
Advertisements

What is an application?. An application is... An application (or app) is a type of software that allows you to perform specific tasks! Applications for.
Objectives Overview Define an operating system
Getting Started. Intro Must Haves and Best Practices Demo Q&A Agenda.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
A+ Certification Guide Chapter 10 Mobile Devices.
Presentation By Deepak Katta
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
INTRODUCTION TO MOBILE COMPUTING. MOBILE COMPUTING  Mobile computing is the act of interacting with a computer through the use of a mobile device. 
Introduction Our Topic: Mobile Security Why is mobile security important?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Survey of PC and Network Operating Systems
Practical PC, 7th Edition Chapter 2: Working with Windows
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
HOW-TO guide This tutorial has sound.
1 of6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Troubleshooting Windows Vista Security Chapter 4.
Explain the purpose of an operating system
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
ISmart for iDevices Apple iPad/iPhone/iPod By Tamara Ottum, MxCC Librarian Updated by Sandra Couture, MxCC Ed Tech Specialist.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
BIT 285: ( Web) Application Programming Lecture 15: Tuesday, February 24, 2015 Microsoft Azure Instructor: Craig Duckett.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
FriendFinder Location-aware social networking on mobile phones.
Toolooa SHS BYOD Parent Information Night. Why is BYOD (Bring Your Own Device)happening? The current hire devices were Federally funded and the funding.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
FriendFinder Location-aware social networking on mobile phones.
PC Support & Repair Chapter 8 Mobile Devices. Objectives After completing this chapter, you will meet these objectives: ▫ Explain the basic features of.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Technology Requirements for Online Testing Training Module Copyright © 2014 American Institutes for Research. All rights reserved.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Make Your iPad Work for You Session 2 Brian McCarty.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
How to Use an Android Tablet Well Come To You few Steps For How to Use an Android Tablet?
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
How to fix Netflix Signing In Issues? For More Details Visit Our Website
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Chapter 10 Mobile, Linux, and OS X Operating Systems
Mobile Operating Systems
 Gmail is a free webmail service, developed by Google.  Gmail also supports advertising.  Users can access Gmail on the desktop, laptop or through.
OS X Yosemite Troubleshooting 9L0-066 Exam Questions Pack
CompTIA IT Fundamentals Study Guide (FC0-U51)
Mobile Operating Systems and Connectivity
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
AirDrop Not working issue on MacBook Pro, iMac & iOS 11
Tablet and eBook Orientation
About AirPrint AirPrint is an Apple technology that helps you create full-quality printed output without the need to download or install drivers.
Tablet and eBook Orientation
Tablet and eBook Orientation
Chapter 10 Mobile, Linux, and OS X Operating Systems
Tablet and eBook Orientation
Cisco Networking Academy Program IT Essentials
Presentation transcript:

Computer Maintenance Chapter Ten Mobile Devices Dr. Mohammad AlAhmad

Chapter Ten Mobile Devices "Allah, increase me in knowledge." (Taha 16:114)

Chapter Ten Mobile Devices The learning objectives of this chapter are Objectives Understand basic features of mobile operating systems. Learn how to establish basic network connectivity and configure such as: wireless/cellular data network, Bluetooth and configuration. Compare and contrast methods for securing mobile devices. Troubleshooting and repairing mobile devices. Understand basic features of mobile operating systems. Learn how to establish basic network connectivity and configure such as: wireless/cellular data network, Bluetooth and configuration. Compare and contrast methods for securing mobile devices. Troubleshooting and repairing mobile devices.

Chapter Ten Mobile Devices Mobiles devices encountered in this Chapter include smart phones, PDAs and tablet computers. These devices are differ from larger computing devices in terms of size of resources they consume, operating systems they use and their features. In the next sections, I will dig and explore more about these topics Basic Features of Mobile Operating Systems

Chapter Ten Mobile Devices Two popular competitors mobile operating systems are widely used today’s which are Android and iOS. Android is built by Google on Linux kernel with a core set of libraries that are written in Java. It is an open source operating system which means that developers have a full access to the same framework APIs used by the core application. The Apple iOS is built by Apple corp. Developers must use the software development kit provided by Apple and register as Apple developer. That means, iOS is not an open source operating system Android vs. iOS

Chapter Ten Mobile Devices Applications (or simply apps) for Android systems can be obtained from Google Android market or many other sites. Where Apple is tightly controls the sales of apps (many apps are free) and can be obtained from the Apple App store site. Each of these mobile systems provide different screen orientations. In particular, they both provide accelerometers and gyroscopes to determine the movement and tilt of the device. This means the device can tell which way the screen is held. They use this information to automatically adjust the display orientation appropriately with no action on the part of the user Android vs. iOS

Chapter Ten Mobile Devices Also, iOS and Android support screen calibration. That means when you touch the screen, the mobile operating system will react accordingly. Many devices contain a built-in calibration tool. In case of failure of calibration functionality, the mobile operating system will ask you to touch the screen in various ways which results in relearning how to react to your touch. Moreover, Android phones get information directly from satellite in order to determine their locations. While iOS phones use combinations of Wi-Fi towers, GPS, and cell towers to determine your location Android vs. iOS

Chapter Ten Mobile Devices This section covers the most demanded functions mobile users needed, these functions are: wireless/cellular data network (enable/disable), Bluetooth and configuration Establish Basic Network Connectivity and Configure

Chapter Ten Mobile Devices Like other computing devices, today, mobile devices offer more robust functionality when connected to a data network especially if that data network is the Internet). Typically, there are two kinds of data network that mobile devices can connect to gain access to the Internet: cell phone networks and Wi-Fi network. In the past, Wi-Fi was the preferred network to join for mobile users due to its high speed, but now, the 4G Long Term Evolution (LTE) high speed of data transfer rate offered by the cell phone network becomes a powerful competitor in performance to the Wi-Fi networks Wireless/Cellular Data Network

Chapter Ten Mobile Devices As a user, you have the choice to connect to a Wi-Fi automatically (assuming you are legitimate user of this Wi-Fi network and you have accessed it previously) if you are in the range of this network or to stay connect it to your cell phone network (again, assuming you are a subscriber to one of cell phone networks). Moreover, iOS and Android users can decide to enable or disable the “cellular data” option from the setting menu which enable/disable data to go in and out from your mobile device Wireless/Cellular Data Network

Chapter Ten Mobile Devices Making a Wi-Fi connection in mobile devices is much like doing so with laptops. In the setting menu of both iOS and Android operating systems will be a section for Wi-Fi (in iPhone or iOS systems it’s called Wi-Fi and in Android systems it’s called Wireless and Networks). Once you access it, you will see all the available Wi-Fi network in range. Again, just you would do with laptops, connect to the desired Wi-Fi network and you might need to enter its password (in case of logging for the first time or you have disabled to save the password option in your device if you logged in to this Wi-Fi network previously). Both iOS and Android mobile users can preconfigure a secure wireless networks as well as those which the Service Set Identifier (SSID) has been hidden Wireless/Cellular Data Network

Chapter Ten Mobile Devices Bluetooth is a short wave length technology used to connect between devices. It can connect any device has a Bluetooth feature with another mobile device, a printer, speaker, keyboard, headphones and GPS unit that also support Bluetooth feature. Android and iOS operating systems support Bluetooth technology. The first step to use Bluetooth is to enable pairing between these two devices. You might need to make the other device in discoverable mode. Next, you need to enter the pin code when you select the other device from the list of discovered devices. Lastly, you need to test the communication between the two connected devise via Bluetooth. For example, if you are using a headset, turn on some sound from your Android or iOS device to check if you can hear it from the headphone Bluetooth

Chapter Ten Mobile Devices is one of the most important functions that people need to access through their mobile devices. There are two types of accounts: POP3 and IMAP. IMAP account offers more functionality than POP3 account. To setup an account, you need to know the URL of your POP3 or IMAP server or sometimes it’s called incoming server, the URL of your SMTP server (this server sends your to the recipients server or sometimes it’s called outgoing server), the port number of both server sides and the security type used (if any) Configuration

Chapter Ten Mobile Devices Sometimes, your work is configured with Microsoft Exchange server. The setup is not very different than the previous discussion, but it does require more information like: Exchange server address, username and password for account and domain name for the account. In either iOS or Android operating systems, it highly recommended to use security if your server supports it. This will encrypts all the traffic going in and out between the mobile device and the server. The choices of encryption are usually SSL or TLS schemes. So you need to know which one of these to use Configuration

Chapter Ten Mobile Devices If laptops are easy to steal, smaller mobile devices are even more so. As mobile devices store valuable data, the need to secure these devices grows. This section address these mobile security mechanisms like: passcode locks, remote wipes, locator applications, remote backup applications, failed login attempts restrictions, antivirus and patching/OS updates Compare and Contrast Methods for Securing Mobile Devices

Chapter Ten Mobile Devices Passcode locks is the most and first security measures you need to implement in your mobile device. It prevents any person to use it in case of stolen. iOS and Android operating systems support passcode locks in different types such as: pattern and pin or password. Remote wipes are instructions sent to mobile device to erase all data in case if the device is stolen. This feature is related to the locator application. Where, locator application allow you to locate the device, lock the device and even send a message offering a reward for its return. iOS and Android operating systems support both remote wipes and locator application features Compare and Contrast Methods for Securing Mobile Devices

Chapter Ten Mobile Devices Backing up your data can be performed by connecting your device to a Mac and using iTunes to manage the content in case of iPhone. Where Android has always taken a cloud approach to backup data. Another security mechanism of mobile security is locking out an account after a certain number of failed attempts. On iOS, the Erase Data function to perform a wipe remote can be set associated with repeated failed login attempts (10 failed attempts). Where, Android does not have this feature built in but does provide APIs that allow developers to create applications that will do that Compare and Contrast Methods for Securing Mobile Devices

Chapter Ten Mobile Devices Mobile devices suffer from viruses and malwares just like desktops and laptops. In particular, Android users suffer more than iOS users. The reason behind that refer to the open network environment that Android uses which expose the network’s users to more attacks. On the other side, Apple corp. uses a closed network which forces all iPhone users to connect through their network (App. Store) in order to update or download applications. As a result, the benefit of Apple closed network is to decrease the viruses and malwares vulnerabilities. Lastly, security patches and operating system updates are so crucial for all users to keep their devices functioning perfectly. Android and iOS operating systems updates are available on an ongoing basis Compare and Contrast Methods for Securing Mobile Devices

Chapter Ten Mobile Devices A third party mobile technician will join the computer maintenance class in order to demonstrate to students how to troubleshoot, replace broken screen and show some useful features of iOS and Android smart phones. After this tutoring session, you will be able to fix your smart phone without referring to phones repair shops Troubleshooting and Repairing Mobile Devices

Chapter Ten Mobile Devices Summery Understand basic features of mobile operating systems. Learn how to establish basic network connectivity and configure such as: wireless/cellular data network, Bluetooth and configuration. Compare and contrast methods for securing mobile devices. Troubleshooting and repairing mobile devices. Understand basic features of mobile operating systems. Learn how to establish basic network connectivity and configure such as: wireless/cellular data network, Bluetooth and configuration. Compare and contrast methods for securing mobile devices. Troubleshooting and repairing mobile devices.

“Software and Hardware of a computer are just like the Soul and the Body of human being respectively” Mohammad AlAhmad alahmad.biz