Learning unit 7 Flashcards
Four most popular mobile OSs:
-Android OS by Google
Based on Linux
-iOS by Apple
Based on macOS
-Windows 10 Mobile by Microsoft
Based on Windows 10
-Windows 10 Mobile by Microsoft
Based on Windows 10
Discuss Android managed by Google
-Based on Linux and uses a Linux kernel
-Linux and Android are open source
Releases of Android
-Jellybean
-KitKat
-Lollipop
-Marshmallow
Things that the Android OS can do
-Use an embedded browser
-Manage a database using SQLite
-Connect to Wi-Fi, Bluetooth, and cellular networks
Functions of a digital assistant
responds to a user’s voice commands with a personable, conversational interaction to perform tasks and retrieve information
Google’s approach to security with Chrome OS:
-Sandboxing
-Verified boot
-Power washing
-Quick updates
Differences between open source and closed source
Open source:
can be obtained from many sources
Closed source:
only have access to APIs, which are calls to the OS
Disadvantages of open source
-No assurance of quality
-The market is not always convenient for developers
-Many variations of Android exist, creating incompatibilities
Information that might be used when a connection is first made
-IMEI – a unique number that identifies each mobile phone or tablet device
-IMSI – a unique number that identifies a cellular subscription for a device or subscriber
-ICCID – identifies the SIM card,
USB connectors used
microUSB, miniUSB, and USB-C
Define Bluetooth
a short-range wireless technology to connect two devices in a small PAN
Define IR (infrared)
a wireless connection that requires an unobstructed “line of sight” between the transmitter and receiver within 30 m of each other
Define Near Field Communication (NFC)
a wireless technology that establishes a communication link between two NFC devices
Difference between syncing and backups
Syncing mirrors app data and other content among your devices and/or the cloud that use the same Apple or Google account
Backups are copies of app data, configuration settings, and other content stored in case you need it to recover from a failed, lost, or corrupted device
Back-Up and Recovery options:
-File-level backup
-Partial image-level backup
-Combination of file-level and partial image-level backups
Lock methods to control access to the device
-Screen lock
-Swipe lock
-PIN lock
-Passcode lock
-Pattern lock
-Fingerprint lock
-Face lock
Screen lock options:
-Restrict failed login attempts
Specify that data be erased after a certain number of failed login attempts, or block further attempts
-Full device encryption
Encrypts all the stored data on a device
-Multifactor authentication
Requires two forms of authentication
Software can help secure data through
-OS updates
-Antivirus/anti-malware
-Trusted sources
-Firewalls
Discuss BYOD (Bring Your Own Device)
-An employee or student is allowed to connect his own device to the corporate network
-For security purposes, an organization configures the person’s device before allowing it to connect to the network
-Utilizes security profiles
Define security profiles
a set of policies and procedures to restrict how a user can access, create, and edit the organization’s resources
Symptoms that might indicate malware might be at work:
-Power drain, slow data speeds
-Dropped phone calls or weak signal
-Unintended Wi-Fi and Bluetooth connections
-Unauthorized account access
-Unauthorized location tracking
General steps for removing malware from a mobile device
-Uninstall the offending app
-Update the OS
-Perform a factory reset
tips to keep a mobile device clean
-Keep OS updates current
-install an anti-malware app
Define Internet of Things (IoT)
Devices connected to the Internet for a specific purpose
What wireless technologies are used by smart home devices
Z-Wave and Zigbee
Wi-Fi and Bluetooth
You can enhance a smart home network with
-Smart speaker
-Controller hub
Solving short battery life
- Disable wireless connections and close apps when you’re not using them
- look into a replaceable battery
Solving Inaccurate touch screen response
Remove protective cover
Solving unresponsive touch screen
-Clean the screen with a soft, damp cloth
-Don’t use the touch screen when your hands are wet
-Restart the device