Mobile Devices 1.1 - 1.4 Flashcards
The display is …
usually an LCD or organic light-emitting diode (OLED) display
Backlight technology uses LEDs instead of …
- uses LEDs instead of CCFLs
- has strips of LED lights
- most LEDs do not need an inverter
- Tablets and phones, almost exclusively use LED backlighting
The inverter is a
DC –>AC
The inverter is a small circuit board installed behind the LCD panel
* flickering screens or dimness = inverter
If you see a laptop advertised as having an LED display
it’s an LCD monitor with LED backlighting
LCD monitors in use today (3)
LCD monitors in use today:
-in-plane switching (IPS)
- twisted nematic (TN)
- vertical alignment (VA).
LCDtechnology = liquid crystals and transistors to form patterns
TN has somewhat restricted
- viewing angles and not the best color reproduction
BUT - very little lag
- high refresh rates such as 240 Hz with ease
- popular choice for competitive gamers & offices
- not the best choice for high-end video needs
IPS have the best
- viewing angles and color reproduction of all
BUT - more lag than TN monitors do, but the difference is minimal in higher-end models
- graphic designers and video artists
- can mount them vertically eg programmers
VA has the best
- contrast ratios (difference between dark & bright colors)
- bit more lag (but we’re talking milliseconds here)
BUT - a jack-of-all-trades technology vs the other two options.
An OLED display supplies the light source, so there is no need for
a backlight, so power consumption is less than it is in LCD panels
- contrast ratio of OLED displays exceeds that of LCD panels, meaning that in darker surroundings, OLED displays produce better images than LCD panels produce.
- OLED monitors are the highest-quality monitors you will find on the market today.
- OLED is found in smaller devices such as smartphones
A digitiser is
A digitizer is a device that can be written or drawn on, and the content will be converted from analog input to digital images on the computer
- input from a user’s finger or a stylus
- glass of the display itself, or an overlay for the display
With a laptop, almost all components must be integrated onto the motherboard, including
onboard circuitry for the USB, video, expansion, and network ports
In most cases, this processor cannot be
removed, meaning no processor upgrades are possible.
Most laptops will run the processor in a lower power state when on battery power to extend the life of the battery. This is known as
processor throttling. The motherboard works closely with the operating system to determine if the processor really needs to run at full speed. If it doesn’t, it’s slowed down to save energy and to reduce heat
DDR SODIMMs pins range from 200 to …
200-pin DDR/DDR2
204-pin DDR3,
260-pin DDR4, and
262-pin DDR5 options
How much memory does each DDR have? (GB)
DDR 1 GB per module
DDR2 and DDR3 SODIMM up to 8 GB
DDR4 up to 32 GB
DDR5 up to 64 GB
Laptops don’t have the room for the full-sized 3.5″ hard drives that desktop computers use, instead they have
Laptops don’t have the room for the full-sized 3.5″ hard drives that desktop computers use. Smaller form factor drives at 2.5″ or 1.8″
Newer SSDs may come in the even smaller
Newer SSDs may come in the even smaller M.2 form factor.
Keyboards may need to be replaced if keys are
Keyboards may need to be replaced if keys are missing or are stuck and won’t function
The two primary forms of internal expansion used in laptops today are
The two primary forms of internal expansion used in laptops today are Mini PCIe and M.2
M.2 expansion supports
M.2 supports USB 2.0 and newer. The slowest M.2 slots support PCIe x2 and M-keyed slots support PCIe x4, making it much faster than Mini PCIe. Most M.2 expansion cards focus on communications or storage.
Mini PCIe has been the most common slot for
Mini PCIehas been the most common slot for laptop expansion cards.
Expansion cards reside inside the case of the laptop and are connected via a
a 52-pin card edge connector.
Mini PCIe cards come in two sizes:
The full-sized cards are 30 mm wide and 51 mm long. Half-sized cards are 30 mm wide and 27 mm long.
Mini PCIe cards support:
Mini PCIe cards support USB and PCIe x1 functionality, and at the same speeds.
Mini PCIe cards have 2 voltages
Mini PCIe cards have the 1.5V and 3.3V power options
Compare M.2 to PCIe
comparing it to Mini PCIe, know that it uses a narrower connector (22 mm vs. 30 mm) that has more pins (66-pin vs. 52-pin). M.2 supports USB 2.0 and newer. The slowest M.2 slots support PCIe x2 and M-keyed slots support PCIe x4, making it much faster than Mini PCIe. Most M.2 expansion cards focus on communications or storage.
Common types of cards you will see in the market include the following:
Wi-Fi network cards
Bluetooth cards
Cellular cards
SSDs
Laptops utilize DC power to energize their internal components. Therefore, any AC power source needs to be …
AC power source needs to be rectified (converted) to DC
Most laptop display backlights require _____ power
AC power. To avoid a separate external AC input, an inverter is used to convert the DC power that is supplied for the rest of the system to AC for the backlight.
converters vs inverters
converters (AC->DC)
inverters (DC->AC)
perform opposite functions
Allow a full battery discharge once a month, called
Battery calibration.
a DC adapter, allows a user to plug the laptop into the
round DC jack inside a car or on an airplane
AC adapter is for a
Wall power outlet
cable lock
cable lock anchors your device to a physical structure, making it nearly impossible for someone to walk off with it
A docking port is
docking port is about 1″ to 2.5″ wide and is used to connect the laptop to a special laptop-only peripheral known as aport replicator, or a similar device called adocking station.
A port replicator/docking station
reproduces the functions of the ports on the back of a laptop so that peripherals that don’t travel with the laptop—can remain connected to the dock and don’t all have to be unplugged physically each time the laptop is taken away
Docking stations are similar to a port replicator but
can contain things like full-sized drive bays, expansion bus slots, optical drives, memory card slots, and ports that are not otherwise available on a laptop eg DVI, DisplayPort for external monitors
= more functionality
Replace the hard drive in a laptop:
Turn off the computer.
Remove the bottom of the case.
Remove the screw holding the M.2 drive in place.
Slide the hard drive straight out of the M.2 connector.
Insert the new drive into the connector at the same angle the old drive was at when it was unscrewed.
Press the drive down and secure it with a screw.
Put the bottom of the case back on.
Replacing Laptop Memory
Remove the bottom cover.
Remove the battery.
Locate the system memory.
In the Dell Inspiron 13 7000, the two RAM modules are under Mylar flaps.
Pull a Mylar flap back to reveal the RAM, as shown with one of the SODIMMs
Carefully spread apart the metal securing clips on each end of the memory module. It will pop up
Lift the memory module out of the slot.
When replacing the SODIMM, be sure to align the notch, and insert the module at the approximate angle it was at when it popped up after being released. Slowly press down on the module until it clicks into place.
Removing a Laptop Keyboard
Remove the bottom cover.
Remove the battery.
Remove the SSD.
Remove the wireless card.
Remove the fan.
Remove the heat sink.
Remove the display assembly.
Remove the I/O board.
Remove the power adapter port.
Remove the motherboard.
Remove the speakers.
Remove the 14 screws that hold the keyboard shield to the base assembly.
Lift the keyboard from the base assembly.
Removing an Internal Laptop Battery
Remove the bottom cover.
Disconnect the battery from the motherboard.
Remove the four screws holding the battery in place.
Lift the battery out of the base assembly.
Removing the Wireless NIC
Remove the bottom cover.
Remove the screw holding the wireless card bracket in place.
The wireless card will pop up
Two major 3G cell standards
GSM - Global System for Mobile Communications
CDMA - code-division multiple access
4G speeds
download speeds of 10–20 Mbps and upload speeds of 3–10 Mbps.
4G range
Optimal cell size is about 3.1 miles (5 km) in rural areas
Reasonable performance for about 19 miles (30 km).
5G speeds are
in excess of 1 Gbps. The theoretical maximum peak download capacity is 20 Gbps
A mobile hotspot lets you share your
A mobile hotspotlets you share your cellular Internet connection with Wi-Fi-capable device
Tethering
Tethering is when you have connected a device to a mobile hotspot using a USB cable
PRL is
The PRI contains settings for configuration items on the device that are specific to the network that it’s on. It is the reference guide the phone uses to connect to the proper cell phone tower when roaming.
IMEI is a serial number that
International Mobile Equipment Identity The International Mobile Equipment Identity (IMEI) is a 15-digit serial number that is unique to each phone. If a phone is reported stolen, the IMEI will be declared invalid and the phone disabled
SSID transfers
Before you can transfer data over a Wi-Fi network, you have to find the network by its Service-Set IDentifier (SSID), or you have to enter the SSID if it is not being broadcast.
Bluetooth Pairing Steps
Enable Bluetooth.
Enable pairing.
Find a device for pairing.
Enter the appropriate PIN code.
Test connectivity.
Two different technologies combine to form what we know as location services, and they are
GPS and cellular location services.
Global Positioning System (GPS) is a
Global Positioning System (GPS)is a satellite-based navigation system that provides location and time services. It requires input from four satellites to provide location and elevation or from three satellites to provide location.
Cellular location services vs GPS
Does the same thing as GPS but
- is not free
- uses cell phone towers to triangulate
- less accurate
- requires cell reception
Mobile devices use 3 things for location
GPS, cellular & wifi signals
MDM
Mobile Device Management is a software package residing on a server. It enrols mobile devices on a corporate network & manages security.
MAM
Mobile Application Management is implemented in conjunction with an MDM & allows network administrators to remotely install, delete, encrypt, and wipe corporate applications and related data from mobile devices.
BYOD
Bring your own device (MAM allows for deleting all corporate info if stolen/lost)
SMTP
Simple Mail Transfer Protocol - used to communicate between client and server and between servers to send mail to a recipient’s account. The key word issend.
TCP 25
POP/POP3
Post Office Protocol - Used to communicate between a client and the client’s mail server to retrieve mail with little interaction.
TCP 110
IMAP
Internet Message Access Protocol - Used to communicate between a client and the client’s mail server to retrieve mail with extensive interaction.
TCP 143
SSL & TLS
Secure Sockets Layer (SSL)orTransport Layer Security (TLS)- used on top of unsecure SMTP, POP, IMAP protocols.
TCP port 443
SMTP, IMAP, POP using TLS / SSL ports are
SMTP with TLS - port 587
SMTP with SSL - port 465
IMAP4 with SSL/TLS - port 993
POP3 with SSL/TLS - port 995.
Four commercial email providers to be familiar with are
iCloud, Google/Inbox, Exchange Online, and Yahoo Mail. Hotmail used to be a commercial email provider, but it no longer exists; it’s now part ofOutlook.com.
A mobile device is having intermittent communications issues. Which software component of a mobile phone is most likely responsible for these issues?
Each mobile phone has a separate processor that manages wireless communications, also known as radio communications or baseband communications. There is a baseband OS that manages this, and it works with the primary OS on the phone. A SIM OS is for managing data transfers between the phone and the SIM chip.
Microsoft vs ActiveSync
Microsoft 365 is able to sync desktop settings between multiple Windows-based computers. ActiveSync is for syncing mobile devices with an Exchange email server.
Steps for pairing Bluetooth
enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and test connectivity.
Commonly synced items
Contacts, calendar, and apps are commonly synchronized, along with pictures, music, videos, email, bookmarks, documents, location data, social media data, e-books, and passwords.
Mail access uses standard secure or unsecure
TCP ports, not UDP ports.
Explain how to establish Wi-Fi connectivity on an Apple iPhone.
Tap the Settings app on the Home screen.
Select Wi-Fi from the Settings menu.
Swipe the Wi-Fi switch to the right to turn it on if it is off. You can also tap switches to toggle them to the opposite state.
In the Choose A Network list, tap the name of the wireless network you want to join.
Encrypt emails using
Config S/MIME secure/multi-purpose Internet mail extensions
The liquid crystal display (LCD) is no longer spreading the light over the entire screen. Which component of the LCD is most likely causing this problem?
diffuser = takes the points of light and uniformly spreads them out over the entire area of the display. The light is dispersed by a plastic plate around the entire area of the display. A diffuser is placed on top of the dispersion plate.
An LCD is mounted onto an inverter or backlight assembly to provide
backlight to the display
Backlights use AC power
Inverters are any component that converts the direct current (DC) power being used to power the device into the alternating current (AC) power used by the backlight.
International Mobile Equipment Identification (IMEI) refers to the mobile phone
serial number.
International Mobile Subscriber Identification (IMSI) refers to the cell phone number assigned to the
SIM card.
A mobile device management (MDM) system is a solution that uses
software as a component to provision mobile devices while protecting an organization’s assets, such as its data. These MDMs apply software, processes, and security policies for mobile devices and their usage.
Mobile application management (MAM) is similar in concept to an MDM however, this system focuses on
managing the applications on mobile devices to ensure that they are secure and are being used properly. Corporate applications are often overseen by a MAM. When a corporation has its own application, such as a company portal or cloud system, they can implement a MAM to ensure that only authorized users are able to connect to these applications from approved mobile devices, that user activity is monitored and audited to prevent suspicious behaviors, and that security is not compromised as more devices are able to connect into these applications.