Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User.

Similar presentations


Presentation on theme: "© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User."— Presentation transcript:

1 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User

2 2 2 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 5.5Identify software for various mobile devices 5.6 Explain the general differences between office-based and mobile work models 5.7 Summarize how users of mobile computing devices can protect themselves and their devices while using them courteously

3 3 3 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Software Software:Software: –For notebooks, tablets, and netbooks –To support mobile devices –To assist with mobile computing –For general use (apps)

4 4 4 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Notebooks, Tablets and Netbooks Software is limited only by what the hardware and OS are capable of runningSoftware is limited only by what the hardware and OS are capable of running Power plan:Power plan: –When you begin using the computer, check power type, battery level, and power plan –Hover the mouse over the battery icon –Hover the mouse over the wireless icon to display the quality of the wireless connection

5 5 5 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Devices Ring tones: Sounds that signal an incoming call or text messageRing tones: Sounds that signal an incoming call or text message –Can be chosen by the user –Most phones include an assortment –Other ring tones available Wallpaper: Customized background appearance of the screenWallpaper: Customized background appearance of the screen –Varied options –Can be created on a PC and transferred to the phone –Free wallpaper available online may introduce malware

6 6 6 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Computing Anti-malware is needed for a smart phoneAnti-malware is needed for a smart phone Synchronizing programs transfer information between devicesSynchronizing programs transfer information between devices Wi-Fi scanning software makes it easy to connect to open Wi-Fi networksWi-Fi scanning software makes it easy to connect to open Wi-Fi networks Apps for QR codesApps for QR codes (two-dimensional bar codes that encode Web addresses that encode Web addresses and other information)

7 7 7 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. General Use Many programs are available for smart phones and PDAsMany programs are available for smart phones and PDAs Programs vary by devicePrograms vary by device Some apps make the online experience better with Web browsing, social networking, etc.Some apps make the online experience better with Web browsing, social networking, etc. Some apps support particular interestsSome apps support particular interests Some apps offer business and productivity softwareSome apps offer business and productivity software

8 8 8 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Choosing Software to Download Apps are generally organize by keyword or categoryApps are generally organize by keyword or category Ways to improve the chance of finding useful software:Ways to improve the chance of finding useful software: –Visit the application store –If the store has knowledgeable salespeople, ask them –Ask a knowledgeable friend –Visit a trusted download site for PC programs

9 9 9 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Effective Mobile Business FlexibilityFlexibility Mobile considerationsMobile considerations Specific tips for businessesSpecific tips for businesses Considerations for mobile workersConsiderations for mobile workers When and where to workWhen and where to work

10 10 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Flexibility Flexibility is one key benefitFlexibility is one key benefit –Virtual teams: Teams whose members are geographically dispersed and use technology to communicate –Telecommuting: The practice of having employees work remotely

11 11 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Considerations Management styleManagement style – Managers must be able to supervise from a distance Performance measurementPerformance measurement –Performance must be measurable from a distance CostsCosts –Virtual office: company sets up minimal office services Information risk:Information risk: –Potential of risk to the company’s intellectual property

12 12 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Specific Tips for Businesses Manage by goal, not by typing timeManage by goal, not by typing time Make some of the work goals very short termMake some of the work goals very short term Establish workers availabilityEstablish workers availability Give supervisors guidelinesGive supervisors guidelines

13 13 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Mobile Workers Considerations for mobile workersConsiderations for mobile workers –Preferred environment –Active communication –Consistent focus –Appropriate tasks When and where to work:When and where to work: –Finding a quiet place –Setting a schedule –Prioritizing work

14 14 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Safe Computing Driving safelyDriving safely –A prevalent risk in mobile computing is the danger of using cell phones while driving Protecting equipment from theft, loss, and damageProtecting equipment from theft, loss, and damage –Keep your cell phone in a safe place Protecting privacyProtecting privacy Installing malware protectionInstalling malware protection

15 15 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Safe Computing Accessing public Wi-Fi spots safelyAccessing public Wi-Fi spots safely –Be cautious about joining open wireless networks Virtual private network (VPN): a private, secure connectionVirtual private network (VPN): a private, secure connection –A VPN uses tunneling, a method in which each piece of data (each packet) from the sending computer is encapsulated within another packet before being sent –Individuals can subscribe to a personal VPN for a fee

16 16 © 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Courteous Computing Pay attention to one thing at a timePay attention to one thing at a time –Excuse yourself to take a call Keep private conversations privateKeep private conversations private Turn down or mute the sound on your deviceTurn down or mute the sound on your device Say good-bye when chatting or sending instant messagesSay good-bye when chatting or sending instant messages Write when you’re calmWrite when you’re calm


Download ppt "© 2013 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5B The Mobile User."

Similar presentations


Ads by Google